What Is MTA-STS? SMTP TLS Policy Explained
Learn what MTA-STS is, how it enforces TLS for email delivery, what the policy looks like, and how it works with DNS and HTTPS.
Tools For This Topic
What MTA-STS is
MTA-STS (Mail Transfer Agent Strict Transport Security) is a security standard that allows a domain to enforce encrypted SMTP connections using TLS.
It protects email delivery from downgrade attacks and misconfigurations by telling sending mail servers that TLS must be used and that the receiving server must present a valid certificate.
You can check your MTA-STS configuration with the DNS Pro MTA-STS Check tool.
For comparison, you can also use MXToolbox: https://mxtoolbox.com/MTASTS.aspx
Why MTA-STS matters
Without MTA-STS, SMTP delivery may fall back to unencrypted connections if TLS fails. This makes email vulnerable to interception or downgrade attacks.
MTA-STS ensures that sending servers either deliver securely using TLS or fail the delivery attempt instead of silently downgrading.
How MTA-STS works
- The sending server looks for an MTA-STS policy via DNS
- It fetches the policy file over HTTPS
- It validates the policy rules (mode, MX hosts, TLS requirements)
- It enforces TLS and certificate validation during delivery
The DNS record
MTA-STS is enabled via a TXT record at _mta-sts.yourdomain.com.
_mta-sts.example.com. 3600 IN TXT "v=STSv1; id=2026040301"The id value is used for cache invalidation when policies are updated.
The HTTPS policy file
The actual policy is hosted over HTTPS at a well-known location:
https://mta-sts.example.com/.well-known/mta-sts.txtExample policy file:
version: STSv1
mode: enforce
mx: mail.example.com
mx: backup.example.com
max_age: 86400Policy fields explained
- version → must be STSv1
- mode → none, testing, or enforce
- mx → allowed receiving mail servers
- max_age → how long the policy is cached (in seconds)
MTA-STS modes
- none → policy is not enforced
- testing → policy is evaluated but not enforced
- enforce → TLS is required and delivery fails if conditions are not met
How MTA-STS works with TLS-RPT
MTA-STS enforces secure delivery, while TLS-RPT provides visibility into delivery failures.
Together, they allow both enforcement and monitoring of SMTP TLS behaviour.
Learn more about reporting here: /articles/what-is-tls-rpt
What to check
- The _mta-sts TXT record exists and is correctly formatted
- The policy file is accessible over HTTPS
- The certificate on mta-sts.yourdomain.com is valid
- The MX hosts listed match your actual mail infrastructure
- The mode is appropriate (testing vs enforce)
Common mistakes
- Publishing the DNS record but not hosting the policy file
- Using incorrect MX hostnames in the policy
- Leaving mode set to testing indefinitely
- Misconfigured HTTPS (invalid certificate or inaccessible endpoint)
- Forgetting to update the id field after policy changes
Basic validation commands
# Check MTA-STS DNS record
dig TXT _mta-sts.example.com
# Fetch policy file
curl https://mta-sts.example.com/.well-known/mta-sts.txtUse These DNS Pro Tools
If you want to validate this topic in practice, these DNS Pro tools are the fastest next step.
Related Tools
Related Articles
What Is TLS-RPT? SMTP TLS Reporting Explained
A practical reference guide to TLS-RPT, including what the record looks like, what the tags mean, and how it fits alongside MTA-STS.
What Is a DMARC Record? Tags, Policy, and Examples
Learn what a DMARC record is, what the main DMARC tags mean, how policy works, and how to review a DMARC record correctly.
What Is DMARC and How Does It Work?
Learn what DMARC is, how DMARC uses SPF and DKIM alignment, what policy modes mean, and how DMARC helps prevent domain spoofing.
