What's New

Back to tools

FREE TOOL

MTA-STS checker

Validate Mail Transfer Agent Strict Transport Security configuration. Ensure TLS encryption is properly enforced for email delivery.

What MTA-STS checks

DNS Record

Verifies MTA-STS TXT record at _mta-sts.domain

Policy File

Checks HTTPS-hosted policy at mta-sts.domain

MX Validation

Ensures policy matches mail server configuration

Understanding MTA-STS

MTA-STS (Mail Transfer Agent Strict Transport Security) is a security standard that enforces Transport Layer Security (TLS) for email exchanges between mail servers, preventing downgrade attacks and man-in-the-middle interception.

How it works

DNS announcement

TXT record at _mta-sts.domain signals MTA-STS support with a policy ID.

Policy retrieval

Sending servers fetch the policy via HTTPS from mta-sts.domain.

TLS enforcement

Policy defines which MX servers accept mail and enforces encrypted connections.

Policy modes

Testing mode

Monitor TLS usage without blocking mail. Use for initial deployment.

Enforce mode

Require TLS for all connections. Mail fails if encryption unavailable.

None mode

Disable MTA-STS while keeping DNS record. Used for maintenance.

Implementation steps

1

Create subdomain mta-sts.yourdomain.com with HTTPS certificate

2

Host policy file at /.well-known/mta-sts.txt

3

Start with mode: testing to monitor without blocking

4

Add DNS TXT record at _mta-sts.yourdomain.com

5

Implement TLS-RPT for failure reporting

6

Monitor for 2-4 weeks before enforcing

7

Switch to mode: enforce when confident

Frequently Asked Questions

MTA-STS (Mail Transfer Agent Strict Transport Security) is a security standard that allows domain owners to declare their ability to receive Transport Layer Security (TLS) secure SMTP connections and to specify whether sending SMTP servers should refuse to deliver to MX hosts that do not offer TLS with a trusted server certificate.

It prevents downgrade attacks and man-in-the-middle attacks by enforcing TLS encryption for email transmission. This ensures that emails are not intercepted or read by unauthorized parties during transit.

Implementation involves publishing a DNS TXT record at _mta-sts.yourdomain.com and hosting a policy file at https://mta-sts.yourdomain.com/.well-known/mta-sts.txt. The policy file specifies the enforcement mode and allowed MX hosts.

There are three modes: 'none' (MTA-STS is disabled), 'testing' (reports are generated but delivery is not blocked on failure), and 'enforce' (TLS is required, and delivery fails if validation fails).

Secure your email with MTA-STS

InboxKit automates MTA-STS deployment and monitoring, ensuring encrypted email delivery