Transport Security Guide

Transport security for email, made practical

Opportunistic TLS is better than nothing, but it can still fall back to plaintext. MTA-STS and TLS-RPT help you enforce encryption in transit and see what breaks before you flip the switch.

On this page

  • What MTA-STS and TLS-RPT do (and why they matter)
  • How they work together in a safe rollout
  • Common failure modes that cause delivery problems
  • Links to guides and tools to validate your setup
Transport Security for Email

When email "TLS" isn't guaranteed

Most mail delivery on the internet uses opportunistic TLS via STARTTLS: sending servers try to negotiate encryption, and if it fails, many will still deliver the email unencrypted.

That creates two real-world problems:

  • Downgrade/stripping attacks: an attacker in the middle can interfere with STARTTLS so the session falls back to plaintext (or never encrypts at all).
  • Silent misconfiguration: certificates, TLS settings, or DNS changes can break encryption and you won't know which senders are failing — until users complain about missing mail.

Public guidance calls this out directly: a downgrade attack against opportunistic TLS can result in plaintext communication, not just "weaker TLS".

Reference: Australian Cyber Security Centre guidance (PDF) View PDF

What good looks like

A "good" transport security posture for inbound email usually means:

  • Your domain advertises a clear stance: "TLS is required"
  • Sending systems that support MTA-STS will fail closed if they can't establish a valid TLS session
  • You receive automated visibility into failures, so changes don't break mail silently
  • You have an operational process for MX/certificate changes (because that's where most breakage comes from)

MTA-STS and TLS-RPT in plain English

MTA-STS: "Only deliver mail to us if it's encrypted properly"

MTA-STS lets you publish a policy stating that:

  • Your inbound MX hosts support TLS, and
  • Senders should refuse delivery if they can't negotiate TLS with a trusted certificate.

It's designed to reduce the risk of MITM and downgrade attacks on SMTP connections.

Reference: Google Workspace Admin Help View guide
Reference: RFC 8461 (MTA-STS) View RFC

TLS-RPT: "Tell us when TLS delivery fails and why"

TLS-RPT is how you get reports when a sender can't deliver securely (for example: invalid certs, name mismatch, STARTTLS not offered, policy mismatch).

Those reports help you detect:

  • Misconfiguration (expired certs, wrong names, wrong MX)
  • Potential attacks (unexpected failure patterns)
  • Real-world sender compatibility issues
Reference: UK Government guidance (NCSC / security.gov.uk) View guidance
Reference: RFC 8460 (SMTP TLS Reporting) View RFC

How they work together in practice

If you want to enforce MTA-STS without surprises:

  1. Enable TLS-RPT first (visibility before enforcement)
  2. Publish MTA-STS in testing mode and validate policy retrieval
  3. Fix failures reported by major senders (Microsoft, Google, large ESPs)
  4. Move to enforce once your failure reports are clean and stable

This is the approach recommended in UK government guidance: TLS-RPT gives you the confidence to progress MTA-STS to "enforce".

Common scenarios (quick paths)

  • "We're not sure whether inbound email is always encrypted" → Start with TLS-RPT
  • "We want to prevent downgrade attacks and enforce TLS inbound" → MTA-STS
  • "We changed MX / migrated provider and mail started failing" → Validate MTA-STS policy + certificates
  • "Our MTA-STS policy file still lists old MX hosts" → Fix policy MX alignment and re-test

The things that usually go wrong

Outdated MX entries in your MTA-STS policy

A policy that still references legacy MX hosts (for example after a migration) can trigger delivery failures for senders that honour MTA-STS.

Certificate mismatch on inbound MX

If your MX cert doesn't match the hostname (or chain is broken/expired), enforcement can cause legitimate senders to fail closed.

Policy not reachable or cached incorrectly

MTA-STS depends on retrieving a policy file over HTTPS and caching behaviour. Small hosting/config issues can cause intermittent "policy fetch" failures.

No one reads the reports

TLS-RPT and (separately) DMARC reports only help if someone is responsible for reviewing them and acting on them.

What you need before you start

  • Control of DNS for the domain(s)
  • A stable place to host the MTA-STS policy file over HTTPS
  • Certificate management for inbound MX (and a change process)
  • A mailbox or platform to receive and analyse TLS-RPT reports
  • A clear owner for "mail transport security" changes

How Cydaura helps

We help teams implement MTA-STS and TLS-RPT in a way that survives real-world change (migrations, acquisitions, routing changes, certificate renewals).

That typically includes:

  • Validating your current inbound TLS posture and MX/cert alignment
  • Setting up TLS-RPT reporting and making the reports actionable
  • Publishing and validating MTA-STS policy (testing → enforce)
  • Establishing operational guardrails so future changes don't silently break mail

From start to MTA-STS enforced in 4 weeks

Working with a UK agricultural body, we helped them meet the standards set out in UK Government Guidance on email transport security by designing, implementing, testing and enforcing MTA-STS in 23 days.

The result was MTA-STS in enforce mode, full TLS-RPT visibility, and no disruption to email communications.

Why teams choose us

  • Ex-Mimecast consultants with deep, hands-on experience of mail routing and operational realities
  • Independent advice aligned to your objectives (not licence sales)
  • Practical delivery focus: implement, validate, and leave you with a process you can run