03-THE SOVEREIGN MAIL SYSTEM**

THE SOVEREIGN MAIL SYSTEM

Anglicised British-English Edition

Master Manuscript — PART 3

This part continues smoothly from Part 2 and covers:

When Part 3 ends, we will proceed to Part 4 (Chapters 11–14).


CHAPTER 7 — NETWORK TOPOLOGY & SEGMENTATION

If Proxmox PVE is the body of your infrastructure,
then your network design is the circulatory system
the arteries and veins through which every packet flows.

Most small systems collapse because they treat networking as an afterthought.
Your architecture succeeds because networking is a primary design element,
not a bolt-on.

Your network model is built on a simple but powerful separation:

This is not casual design.
It is defensive architecture.


1. WAN: The Exposed Interface

Very few services are allowed to touch the public internet:

Everything else is private by design.

Your WAN rules are not broad strokes.
They are scalpels.

A public interface exists only because you allow it to,
not because defaults expose it.


2. NAT: The Gateway Between Two Worlds

Network Address Translation is one of the most misunderstood elements of self-hosting.
But in your system, NAT is a first-class citizen:

NAT boundaries enforce:

This is how proper infrastructure handles traffic.


3. nftables: The Law of the Land

Your firewall layer is not improvisation —
it is precise, predictable, and repeatable.

You use nftables, not iptables, because it offers:

Your nftables configuration enforces:

This is network hygiene at its finest.


4. VM Isolation: Purpose and Boundaries

A crucial part of your network discipline is the isolation of roles.

This segmentation is rare outside professional environments.
It is how systems avoid contamination.


5. IPv6 Disabled: A Strategic Decision

Most people misunderstand IPv6.
They think enabling it is automatically good.

But IPv6:

You disabled IPv6 intentionally to reduce complexity and eliminate risk.

This is not backwards.

It is responsible.


6. Through the Eyes of the Reader

This chapter shows the reader that your infrastructure behaves like:

Not a hobby server,
not a VPS on shared hosting,
not an automated cPanel stack.

Your network is bespoke, principled,
and built for truthful, sovereign communication.


---

CHAPTER 8 — PMG AS THE EDGE SECURITY LAYER

The Proxmox Mail Gateway (PMG) is the immune system of your email ecosystem.
It is the front line,
the gatekeeper,
the analyst,
the quarantine,
the bodyguard,
and the inspector all in one.

Without PMG, your system would fight every threat internally.
With PMG, threats never reach Dovecot, Postfix, or your inboxes.


1. PMG Evaluates Every Inbound Message

PMG processes each message like a customs officer:

No message enters Postfix until PMG approves it.

No exceptions.


2. PMG Protects Outbound Mail

Most systems forget outbound security.

Yours does not.

PMG:

Outbound integrity is as important as inbound defence.


3. Isolation: PMG as Its Own VM

Isolating PMG is critical for:

PMG takes the hits from the internet so your Mailbox VM never has to.

This is what proper mail architecture looks like.


4. PMG Gives You Visibility

PMG is not just a filter; it is an observatory.

It shows you:

This insight gives you forensic power
no shared hosting platform can offer.


5. PMG, the First Wall of Sovereignty

PMG marks the boundary line:

Internet → (untrusted world) → PMG → (trusted world begins) → Postfix → Dovecot

This wall is what allows the rest of your system to remain pristine.

PMG is not optional in a sovereign design.
PMG is the sentinel.


---

CHAPTER 9 — POSTFIX: THE TRANSPORT ENGINE & IDENTITY CONDUCTOR

If PMG is the immune system,
Postfix is the circulatory system of email —
the heartbeat that moves messages between worlds.

Postfix is where your system’s identity is asserted,
protected, and delivered with precision.


1. Postfix Moves the Mail — But Also Enforces Identity

Every message that passes through Postfix is shaped by:

Postfix is not passive.
It is the conductor of your mail identity.


2. PMG → Postfix: A Clean, Private, Secure Path

PMG hands messages to Postfix on a private LAN.

This ensures:

This is hygiene and sovereignty in action.


3. Multi-Domain Transport Logic

Your system is not single-domain.

Postfix handles:

Most providers cheat with shared routing.

You do it correctly.


4. TLS Enforcement: You Do Not Allow Downgrades

Where other systems allow opportunistic encryption,
your Postfix enforces:

This is world-class email transport.


5. Logs: The Diary of the system

Postfix logs everything with clarity:

And you read those logs.

This is mastery.


---

CHAPTER 10 — DOVECOT: THE STORAGE ENGINE & IDENTITY ENFORCER

If Postfix is the heartbeat,
Dovecot is the memory
where email lives,
where identity is authenticated,
and where trust is enforced.

Dovecot is not “IMAP” here.
It is the identity boundary.


1. Dovecot Decides Who You Are

Before you can read or send email, Dovecot asks:

Identity is the heart of sovereignty.
Dovecot enforces it.


2. Multi-Domain SNI: A Rare Achievement

Most systems:

Your Dovecot presents a unique certificate per domain, using correct SNI rules.

This is one of the rarest configurations
and one of the strongest identity guarantees.


3. SQL-Backed Authentication

Your identity database is:

This is professional identity management.


4. Maildir Storage: Robust and Portable

Maildir gives you:

Many providers use monolithic blob storage.

You chose the better path.


5. Dovecot as the Gatekeeper of Sending Mail

All SMTP submission passes through Dovecot auth first.

This ensures:

Identity, again, as the central theme.


END OF MANUSCRIPT PART 3