This document outlines the prerequisites for installing the Deaddrop appliance, including system requirements and dependencies. It also describes the necessary specifications for supporting infrastructure components required by Deaddrop.
Deaddrop is deployed via an unattended installation using a dedicated ISO image. It can be installed on both virtual machines and physical servers, providing flexibility for various deployment environments.
The following hardware and virtual hardware recommendations are based on a 200-user license under typical day-to-day usage conditions.
Typical usage is defined as 20–30% of licensed users actively using the system daily, primarily for single dispatch operations involving small to medium-sized files (1–100 MB per file).
Note:
Actual resource requirements may vary depending on:
Scaling adjustments should be made accordingly for heavier workloads or larger deployments.
When deploying Deaddrop in a virtualized environment, the following requirements must be met to ensure stability and performance:
Note: Ensure hypervisor settings do not throttle or overcommit resources in a way that could compromise the performance or reliability of the Deaddrop service.
The table below outlines the recommended hardware specifications for running Deaddrop on a physical server, based on a standard deployment for up to 200 users under typical usage conditions:
deaddrop | deaddrop with AV-plugin | |
---|---|---|
CPU1 | 2 or more cores | 4 or more cores |
Memory | Minimum 16 GB | Minimum 16 GB |
PSU | 2 at least 1 with UPS | 2 at least 1 with UPS |
Boot-mode | UEFI | UEFI |
Network card2 | minimum 1Gbit | minimum 1Gbit |
Hard drives | 2 in raid | 2 in raid |
SAS / RAID card | Support direct access | Support direct access |
Chassis units | 1U chassis | 1U chassis |
Rails | Click rails | Click rails |
Cable Mgmt Arm | 1U chassis | 1U chassis |
Note: These specifications are intended as a baseline. Higher performance may be required depending on file sizes, concurrent usage, and additional services.
Disk performance is a critical factor for both virtual and physical Deaddrop servers. To ensure stability and responsiveness, the following disk-related recommendations and considerations apply:
Storage Sizing – Example Calculation
Below is a conceptual example for estimating minimum disk space required for uploaded files. The actual requirement depends on:
10 users | 100 users | 500 users | |
---|---|---|---|
5Mb files, 2 receivers | 100MB | 1GB | 5GB |
50Mb files, 5 receivers | 2,5GB | 25Gb | 125GB |
1Gb files, 2 receivers | 20GB | 200GB | 1TB |
1Gb files, 10 receivers | 100GB | 1TB | 5TB |
Note: These are conservative estimates. Consider additional overhead for logging, backups, and encryption metadata.
Additional Considerations for Disk Usage:
Deaddrop supports both IPv4 and IPv6 addressing, allowing flexible integration into modern network environments. This enables compatibility with dual-stack networks and ensures future-proof connectivity across diverse infrastructure setups.
Deaddrop requires a fully qualified domain name (FQDN) to function correctly. The FQDN is essential for certificate validation, secure communication, and proper operation of the web interface.
In addition, the server must have access to a DNS resolver to enable hostname resolution for both internal and external network communications.
Note: Ensure that the FQDN is correctly registered and resolves to the appropriate IP address (IPv4 and/or IPv6), and that reverse DNS is configured if required by your security policies.
In most installations, Deaddrop requires access to an SMS gateway to support features such as user notifications, authentication, and alerting.
Alternatively, Deaddrop also supports the use of a physical GSM modem for sending SMS messages. This option may be suitable for isolated or high-security environments where external gateways are not preferred.
Note: Configuration of SMS delivery—whether via gateway or modem—can be managed through the administrative web interface.
The following table outlines the recommended firewall rules for external communication between Deaddrop and its various components and services:
Type | Delivers to | Receivers from | Protocol |
---|---|---|---|
Application | deaddrop | end users | HTTP TCP/80 |
Application | deaddrop | end users | HTTPS TCP/443 |
SMS | SMS gateway | deaddrop | HTTPS TCP/443 |
Admin | ddadm | admin users | HTTPS TCP/8443 |
Admin | console | admin users | SSH TCP/22 |
smtp.tld | deaddrop | SMTP TCP/25 | |
Time | deaddrop | ntp.tld | NTP UDP/123 |
DNS | deaddrop | resolver.dns | DNS UDP/53 |
Logs | syslog.tld | deaddrop | Syslog UDP/514 |
Updates | deaddrop | updates.sysctl.se | HTTPS TCP/443 |
Cert | deaddrop | letsencrypt.org | ACME TCP/443 |
Cert | letsencrypt.org | deaddrop | ACME TCP/80 |
Security Considerations
Be sure to allow outbound HTTPS connections to your specific SMS provider if applicable.
Always review your firewall policies in the context of your organization’s security architecture and network segmentation strategy.
Deaddrop requires a trusted TLS certificate to secure communication for both the administrative interface and the user-facing application.
Certificates can be provisioned in one of two ways:
Deaddrop supports integration with Let’s Encrypt for streamlined certificate issuance and renewal using the ACME protocol.
Alternatively, certificates may be obtained from an internal or external CA and manually configured in the system.
Note: The certificate must match the server’s fully qualified domain name (FQDN) and should be renewed before expiration to avoid service disruption.
© Copyright sysctl Aktiebolag 2013-2025. All rights reserved