The Case for Self-Hosting

The arguments for running your own email server are real, and for the right person, they're compelling. When you self-host, you control every layer of the stack: the software, the storage, the network, the retention policies. You are not subject to a provider's terms of service changes, price increases, or account suspension decisions. You cannot be de-platformed.

Self-hosting also provides a deep education in how email actually works — SMTP, IMAP, DNS, TLS, SPF, DKIM, DMARC, spam filtering. For sysadmins and infrastructure engineers, this knowledge is genuinely valuable. And for organisations with very specific compliance requirements that no commercial provider can meet, self-hosting may be the only option.

Finally, there's the sovereignty argument: your data exists on infrastructure you physically control. No law enforcement request reaches a third-party provider — they'd have to come directly to you, which at minimum provides notification and legal recourse.

What Self-Hosting Actually Involves

Running an email server is not a weekend project that you set up and forget. The minimum viable self-hosted email stack includes:

  • Mail Transfer Agent (MTA) — Postfix or Exim handles the SMTP side: sending and receiving messages between servers
  • IMAP server — Dovecot provides the IMAP interface your email client connects to
  • Spam filtering — SpamAssassin, rspamd, or a commercial antispam service; without it, your inbox is unusable within days
  • DKIM, SPF, and DMARC — cryptographic email authentication records that major providers use to decide whether to accept or reject your mail; misconfiguration means your emails go to spam or are rejected outright
  • TLS certificates — Let's Encrypt has made this easier, but certificate renewal automation needs to be maintained
  • Webmail interface — Roundcube or Nextcloud Mail if you want browser access
  • Backups — a failed disk with no backup means losing all your email history permanently
  • Monitoring and alerting — you need to know immediately when the mail queue fills up, a service crashes, or disk space runs low

All-in-one packages like Mailu, Mail-in-a-Box, and iRedMail simplify the initial setup considerably, but they don't eliminate the ongoing maintenance burden.

The Deliverability Problem

This is where most self-hosting projects hit their first serious wall. Getting emails delivered reliably is hard when you're running a new server from a fresh IP address. Major providers — Gmail, Outlook, Yahoo — operate aggressive spam filtering that is heavily influenced by IP reputation. A new IP with no sending history is automatically suspect.

Your emails may go straight to spam for weeks or months while your IP builds reputation. Even then, a single spam complaint or a brief appearance on a blocklist can set you back to square one. Getting off some blocklists requires fees. Getting off others requires manual review processes that can take weeks.

If your IP address is in a range that a previous customer of your hosting provider used for spam — and this is common on shared infrastructure — you may start with a poisoned reputation before you send a single message. Residential IP addresses are almost universally blocked by major providers.

The Security Burden

When you self-host your email server, you become responsible for security — not just configuring it once, but maintaining it indefinitely. This means:

  • Patching — every vulnerability disclosed in Postfix, Dovecot, rspamd, or the underlying OS needs to be applied promptly. Unpatched email servers are actively targeted by automated scanning tools within hours of vulnerability disclosure.
  • Monitoring — you need to detect intrusion attempts, brute-force attacks on IMAP, and unusual outbound traffic patterns. This requires log management and alerting infrastructure on top of your mail stack.
  • Incident response — if your server is compromised and begins sending spam, you need to detect it, remediate it, and manage the reputational fallout — all while potentially having no access to your own email during the incident.
  • DDoS resilience — email servers are publicly exposed services. Small-scale denial-of-service attacks are not uncommon.

This is 24/7/365 responsibility. Attacks don't wait for business hours.

What Hardware You Actually Need

The hardware question matters more than most guides acknowledge. A self-hosted mail server needs to be reliable, always-on, and well-connected — and the cheapest options often fail on at least one of these dimensions.

Running email on a home server behind a residential internet connection is effectively impossible: most ISPs block port 25 (SMTP), residential IP ranges are universally blacklisted, and home broadband lacks the uptime guarantees email requires. So you need hosted infrastructure.

A cheap shared VPS might seem attractive at €3–5/month, but the problems compound: shared IP ranges (often previously used for spam), noisy-neighbour resource contention affecting your mail queue processing, and limited IOPS that can make full-text search and spam filtering sluggish. If the VPS provider experiences infrastructure issues, your email goes down with no SLA to enforce.

A reliable dedicated server is the minimum realistic option for self-hosted email in production. Dedicated hardware gives you clean IP space, consistent performance, and the ability to configure your network environment properly. Dedicated servers from Evolushost start from €49.99/month and provide the isolation, clean IP reputation, and EU-based infrastructure that serious self-hosted email requires — without the shared-resource problems of VPS hosting.

The Encryption Complexity

If you're self-hosting specifically for privacy, the encryption story is demanding. Out-of-the-box, a standard Postfix/Dovecot setup stores your email in clear text on the server. Encrypting storage at rest is an additional layer. End-to-end encryption requires PGP key management: generating keys, publishing them to key servers, managing key distribution to contacts, handling key expiry and revocation, and dealing with contacts whose clients don't support PGP at all.

Unlike a managed E2EE service where key management is automated, on a self-hosted server this is entirely your problem to solve. A misconfiguration — sending a message without encryption when you thought it was encrypted, or storing keys in a location that's backed up to an insecure destination — is the kind of quiet failure that undermines the entire privacy goal.

Who Should Self-Host

Given everything above, the honest answer is: relatively few people. Self-hosting makes sense if you meet most of these criteria:

  • You are a working sysadmin or infrastructure engineer who manages Linux servers professionally
  • You have time to maintain the stack — patches, monitoring, incident response — on an ongoing basis
  • You have a specific compliance or sovereignty requirement that no managed provider can meet
  • You're running it as a learning project and are comfortable with the deliverability and operational compromises during that learning period
  • You can absorb the cost of proper dedicated infrastructure

If you don't meet most of these criteria, self-hosting is likely to result in a degraded experience — poor deliverability, operational headaches, and paradoxically, a less private outcome than a well-chosen managed provider, because the complexity creates opportunities for configuration errors that leak data.

The Managed Alternative

enemail exists for the people who want the privacy guarantees of self-hosting without the operational burden. Zero-knowledge end-to-end encryption means enemail cannot read your messages — even if compelled, there is nothing to hand over but ciphertext. The infrastructure runs on dedicated EU servers, not shared hosting. DKIM, SPF, DMARC, TLS, spam filtering, and deliverability are all managed by a team that does this full-time.

You get a clean sending reputation from day one. Your messages reach the inbox. Key management is automated. Patches happen without you. And if something goes wrong at 3am, it's the enemail team's problem to fix, not yours.

For researchers, sysadmins, or organisations with specific requirements, self-hosting remains a valid choice — and Evolushost's dedicated server infrastructure is the right foundation for it. But for everyone else, the privacy-to-effort ratio of a well-designed managed E2EE service is substantially better.

The irony of self-hosting for privacy: Most data leaks that occur with self-hosted email happen during setup and maintenance — misconfigured TLS, accidental plaintext fallback, unencrypted backups — not due to provider access. Complexity is the enemy of security.

All the privacy of self-hosting. None of the operational headache.

enemail gives you zero-knowledge encryption, dedicated EU infrastructure, and complete operational management — so you can focus on your work, not your mail server.

Create your free account