MTA-STS
Checker
Validate Mail Transfer Agent Strict Transport Security
Enforce TLS encryption for email delivery
Check MTA-STS Configuration
Verify TLS encryption enforcement for your domain
DNS Record
Verify MTA-STS DNS configuration
Policy File
Check HTTPS-hosted policy
MX Servers
Validate authorized mail servers
What is MTA-STS?
MTA-STS (Mail Transfer Agent Strict Transport Security) enforces authenticated TLS connections for email delivery, preventing downgrade attacks and man-in-the-middle interception.
Get MTA-STS Implementation HelpMTA-STS Implementation Guide
Mail Transfer Agent Strict Transport Security explained
MTA-STS Components
DNS Record
TXT record at _mta-sts.domain.com
v=STSv1; id=20240101
Policy File
HTTPS-hosted at mta-sts.domain.com
/.well-known/mta-sts.txt
Policy Modes
- • testing: Monitor only
- • enforce: Require TLS
- • none: Disabled
What is MTA-STS and Why It Matters
MTA-STS (RFC 8461) is a security standard that enforces Transport Layer Security (TLS) for email exchanges between mail servers. It prevents downgrade attacks where attackers force connections to use unencrypted or weakly encrypted channels. By publishing an MTA-STS policy, you ensure that legitimate mail servers always use encrypted connections when delivering mail to your domain, protecting against eavesdropping and tampering.
MTA-STS vs DANE
While DANE (DNS-based Authentication of Named Entities) provides similar protection, it requires DNSSEC which has limited adoption. MTA-STS works without DNSSEC by using HTTPS to deliver the policy file, making it more widely deployable. Major email providers like Google, Microsoft, and Yahoo support MTA-STS, making it an essential security layer for modern email infrastructure.
MTA-STS Deployment Steps
- Create and host the policy file at https://mta-sts.yourdomain.com/.well-known/mta-sts.txt
- Start with mode: testing to monitor without enforcement
- Add DNS TXT record at _mta-sts.yourdomain.com with unique ID
- Implement TLS-RPT to receive failure reports
- Monitor reports for 2-4 weeks to identify issues
- Switch to mode: enforce when confident
- Update ID in DNS record when policy changes
Common MTA-STS Issues
The most common MTA-STS failures stem from incorrect MX server listings in the policy file. All legitimate mail servers must be listed with their exact hostnames. Certificate mismatches occur when the mail server's TLS certificate doesn't match the hostname. The policy file must be served over HTTPS with a valid certificate. DNS caching can delay policy updates, so plan changes carefully. Always test in testing mode before enforcement to avoid blocking legitimate mail.
Secure Your Email with MTA-STS
InboxKit automates MTA-STS deployment and monitoring, ensuring encrypted email delivery