Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/infertux/zeyple
Postfix filter/hook to automatically encrypt outgoing emails with PGP/GPG
https://github.com/infertux/zeyple
email encryption gpg pgp postfix privacy python
Last synced: 7 days ago
JSON representation
Postfix filter/hook to automatically encrypt outgoing emails with PGP/GPG
- Host: GitHub
- URL: https://github.com/infertux/zeyple
- Owner: infertux
- License: other
- Created: 2012-09-08T18:00:20.000Z (over 12 years ago)
- Default Branch: master
- Last Pushed: 2024-09-09T09:30:14.000Z (5 months ago)
- Last Synced: 2025-01-25T06:06:18.032Z (14 days ago)
- Topics: email, encryption, gpg, pgp, postfix, privacy, python
- Language: Python
- Homepage: https://infertux.com/labs/zeyple/
- Size: 165 KB
- Stars: 147
- Watchers: 21
- Forks: 30
- Open Issues: 17
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: CONTRIBUTING.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# ZEYPLE: Zeyple Encrypts Your Precious Log Emails
[![Funding](https://img.shields.io/liberapay/patrons/infertux.svg?logo=liberapay)](https://liberapay.com/infertux/donate)
[![Build Status](https://github.com/infertux/zeyple/actions/workflows/zeyple.yml/badge.svg)](https://github.com/infertux/zeyple/actions/workflows/zeyple.yml)**Zeyple automatically encrypts outgoing emails with GPG:**
1. It catches emails from your Postfix queue
1. Then encrypts them if it's got the recipient's GPG public key
1. Finally it puts them back into the queue
unencrypted email || encrypted email
sender --> Postfix --> Zeyple --> Postfix --> recipient(s)_Why should I care? If you are a sysadmin who receives emails from various monitoring tools like Logwatch, Monit, Fail2ban, Smartd, Cron, whatever - it goes without saying that those emails contain lots of information about your servers.
Information that may be intercepted by some malicious hacker sniffing SMTP traffic, your email provider, <insert your (paranoid) reason here>...
Why would you take that risk - encrypt them all!_## Install & upgrade
See [INSTALL.md](INSTALL.md) & [UPGRADE.md](UPGRADE.md).
## Disable/enable Zeyple
Just comment/uncomment the line `content_filter = zeyple` in your `/etc/postfix/main.cf` then `postfix reload`.
## Key management
* List of keys: `sudo -u zeyple gpg --homedir /var/lib/zeyple/keys --list-keys`
* Update imported keys: `sudo -u zeyple gpg --homedir /var/lib/zeyple/keys --keyserver hkp://keys.gnupg.net --refresh-keys`
* Import a new key: `sudo -u zeyple gpg --homedir /var/lib/zeyple/keys --keyserver hkp://keys.gnupg.net --search [email protected]`## Integration with other MTAs
Although tested only with [Postfix](http://www.postfix.org/), Zeyple should integrate nicely with any MTA which provides a [filter](http://www.postfix.org/FILTER_README.html "Postfix After-Queue Content Filter")/hook mechanism. Please let me know if you experiment with this.
## Docker
A [Docker image](https://gitlab.com/nebulon42/zeyple-docker) is available for development purposes.
## Vagrant
A fully-setup test-environment is available to easily test your modifications.
[Vagrant](https://www.vagrantup.com/) and a compatible virtualization environment ([VirtualBox](https://www.virtualbox.org/) for example) are required.
Visit [zeyple-vagrant](https://github.com/Nithanim/zeyple-vagrant) for download and more information.## Contributing
See [CONTRIBUTING.md](CONTRIBUTING.md).
## Kudos
Many thanks to [Harry Knitter](http://www.linux-magazine.com/Issues/2013/153/Email-Encryption-with-Zeyple) for his feedback to help make Zeyple more robust.
## Blog posts & articles
- http://www.linux-magazine.com/Issues/2013/153/Email-Encryption-with-Zeyple
- http://blog.infertux.com/2015/10/25/announcing-zeyple/
- http://labs.infertux.com/zeyple/## License
AGPLv3+