[ / / / / / / / / / / / / / ] [ dir / 27chan / agatha / ausneets / fascist / komica / qanon / tacos / turul ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Email
Comment *
File
Select/drop/paste files here
Password (Randomized for file and post deletion; you may also set your own.)
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

New Volunteer

File (hide): df9e727130aa0ef⋯.png (5.58 KB, 255x197, 255:197, nfs-folder-icon.png) (h) (u)

File (hide): dc1ee19bce22c4b⋯.jpg (14.13 KB, 480x360, 4:3, hqdefault.jpg) (h) (u)

[–]

 No.938587>>938935 [Watch Thread][Show All Posts]

So while browsing through the mutt wiki on gitlab, I come across this statement.

>you have to get your mail transferred somehow. In organizations this sometimes is provided via NFS, which means the remote mail-server filesystem appears on your local machine as if it were local, too (keyword "mount"). As end-user normally you don't notice a difference, and likewise there is no need for you to configure anything with your MUA. As regular private user (or even in organized environments) you typically have to download (and can even store back) your mail via IMAP or POP

This makes me wonder. Would it be practical or reasonable for the average email self-hosting anon to do this for his mail, bypassing IMAP or POP entirely and just mounting the mail directly? It doesn't sound completely crazy when you think about it. Looking at Debian's documentation for NFS:

>There are three different modes that nfs can operate in with Kerberos, which should be specified in the mount/export options:

>krb5 Use Kerberos for authentication only.

>krb5i Use Kerberos for authentication, and include a hash with each transaction to ensure integrity. Traffic can still be intercepted and examined, but modifications to the traffic will be apparent.

>krb5p Use Kerberos for authentication, and encrypt all traffic between the client and server. This is the most secure, but also incurs the most load.

so with krb5p, you'd be able to encrypt the transfer too!

Or hell, since setting up Kerberos for this would be a bit overkill, why not SSHFS?

You could legit mount the email over SSHFS!

Am I retarded?

 No.938600>>938601

Yes you're retarded but the cool kind of retarded I want to see this implemented


 No.938601

>>938600

to be perfectly honest, I don't actually self-host yet. cock.li is good enough for me. But when I do eventually self-host, I am absolutely gonna do this.


 No.938606

oh and it would certainly be way simpler/more minimalistic with SSHFS. You wouldn't have to install an IMAP/POP3 solution on the server. Although you would have to get the libfuse stuff on client-side


 No.938731

It's completely practical, but you can't exactly use this unless you're self-hosting, since you need access to the actual maildir.

Plan9 serves email on the filesystem using 9p, which is an even better solution since it can be implemented on top of any other protocol.


 No.938935

>>938587 (OP)

It's completely possible, even practical. Host your own mail server, set your SMTP daemon to deliver to a maildir and do whatever you want with the directory.

My workflow for my primary email account is to ssh into a VPS running OpenBSD and OpenSMTPD and open mutt. On my machine mutt reads from a mbox-type mail spool, although I could easily set that up as maildir if I wanted to go to the trouble of converting my mailbox and updating my configs. I use scp to transfer attachments between my server and desktop. I don't run IMAP or POP daemons at all.


 No.938944>>939809

Some of the early Linux distro sites-- this being back around 1992-- provided NFS access. (Sunsite being one?)

They didn't bother with the Kerberos shit, because it was a PITA just to get working, and the Smart People allowed on the Internet back then knew it was retardedly pointless to fantasize that MAGICAL SOFTWARE IS SECURE.


 No.939809

>>938944

That's what content and package signing is used for. Secure transport layer between you and some domain name impersonator is everything you can be sure of on today's web, not the content origin or authenticity, unless it's software packages and you got the keys from developers in person.


 No.940134

I would not bother with Kerberos or SSH and use OpenVPN instead. This way you only have to worry about security and encryption once and can use the remote machine as if it was part of your LAN from then on.




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
8 replies | 0 images | Page ???
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / 27chan / agatha / ausneets / fascist / komica / qanon / tacos / turul ][ watchlist ]