MTA-STS: A Guide by Sendmarc

Introduction: 

In the realm of digital communication, safeguarding the confidentiality and integrity of emails is a critical aspect of maintaining trust and security. MTA-STS, or Mail Transfer Agent-Strict Transport Security, stands as a pivotal protocol designed to enforce secure email transmission over encrypted connections. This article delves into the deep-rooted significance of MTA-STS in fortifying email security and provides an in-depth exploration of hosting and implementing MTA-STS settings.

 

Detailed Explanation of MTA-STS: 

MTA-STS functions by mandating that SMTP connections occur exclusively over TLS encryption, commonly known as STARTTLS. This stringent requirement acts as a shield against DNS spoofing and SMTP downgrade attacks that could potentially compromise the confidentiality and authenticity of emails during transit. MTA-STS aims to mitigate both vulnerabilities, it is specified in RFC8461.

By enforcing secure communication channels through MTA-STS, organizations can significantly reduce the risk of unauthorized access and tampering of email content, thereby bolstering the overall security posture of email communication mechanisms.

 

Using MTA-STS:
For a domain to use MTA-STS, the domain owner must do the following:

  • Add an A or CNAME type DNS record at mta-sts.[domain] pointing to the HTTPS enabled webservice serving the MTA-STS policy file.
  • Add a TXT or CNAME type DNS record at _mta-sts.[domain] indicating the use of MTA-STS, and update the id value on policy change.
  • Set up an HTTPS enabled webservice with a valid certificate for the domain at mta-sts.[domain] that serves the MTA-STS policy file.
  • (optional but recommended) enable SMTP TLS reporting through TXT or CNAME record placed at _smtp._tls.[domain].

 

Hosting MTA-STS:

The process of hosting MTA-STS entails a meticulous setup of specific DNS records and the provision of the MTA-STS policy file over HTTPS. As a leading provider in email security solutions, Sendmarc takes a proactive role in guiding clients through the intricate steps involved in deploying MTA-STS effectively. This includes assisting in the configuration of DNS records, facilitating the establishment of secure HTTPS-enabled web services for policy file distribution, and ensuring seamless integration of MTA-STS within the existing email infrastructure of organizations. By simplifying the hosting process, Sendmarc empowers clients to enhance their email security effortlessly and effectively.

 

Best Practice Enforcement Settings for MTA-STS: 

Adhering to recommended best practices for MTA-STS settings is paramount to maximizing security efficacy. While enforcing the policy (mode: enforce) is typically recommended, Sendmarc advises starting in testing mode initially. It is crucial to analyze a substantial amount of TLS Reports (TLSRPT) to gauge the impact and effectiveness of MTA-STS before transitioning to enforcement mode.

This cautious approach allows organizations to evaluate the performance of MTA-STS and address any potential issues before fully enforcing the policy. Common pitfalls to avoid include misconfiguring DNS records, serving policy files over non-HTTPS connections, and neglecting routine updates to the MTA-STS policy. By steering clear of these pitfalls and embracing best practices and using a hosted solution, organizations can harness the full potential of MTA-STS to fortify the confidentiality and integrity of their email communications.

Potential risks with enforcing a MTA-STS policy:

  • Delivery Disruptions: The biggest risk is email delivery disruption. If the sending email server doesn't support TLS or its TLS configuration doesn't meet the policy requirements (e.g., outdated certificate), emails will be rejected. 
  • Limited Adoption: Not all email providers currently support MTA-STS. Since we don't know who does or doesn't enforce your policy if you enforce a strict policy, emails from these senders might be rejected, leading to communication gaps and some might get through that should be dropped.