Suped

Does MTA-STS require DNSSEC for policy discovery?

The short answer is no, MTA-STS (Mail Transfer Agent Strict Transport Security) does not require DNSSEC for its policy discovery mechanism. This is one of its key design features, intended to make it more accessible and easier to implement for domain owners compared to other security protocols.

While MTA-STS uses DNS to signal that a policy exists, the actual security of the policy itself relies on HTTPS and the public Certificate Authority (CA) system, not on the cryptographic authentication provided by DNSSEC. This distinction is crucial for understanding how MTA-STS works and why it was developed.

www.verifydmarc.com logo
VerifyDMARC says:
Visit website
The key difference is that MTA-STS achieves these benefits without the need for DNSSEC, making it easier to implement and maintain for many organizations.
Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

How MTA-STS policy discovery works

MTA-STS policy discovery is a two-part process. When a sending mail server wants to send an email to a domain using MTA-STS, it performs the following steps:

  • DNS lookup: The sending server first performs a DNS lookup for a specific TXT record at _mta-sts.yourdomain.com. The presence of this record, as noted by TechTarget, indicates that the domain has an MTA-STS policy.
  • Policy fetch: The DNS record doesn't contain the policy itself. Instead, it provides a version and an ID. The sending server then constructs a URL (e.g., https://mta-sts.yourdomain.com/.well-known/mta-sts.txt) and fetches the policy file from a web server over a secure HTTPS connection.

The security of this process hinges on the sending server validating the web server's SSL/TLS certificate. This ensures the policy it receives is authentic and has not been tampered with by an attacker.

The role of DNS in MTA-STS

The DNS record is purely a discovery mechanism. Its job is to announce to the world that an MTA-STS policy is available and to provide an ID for that policy. Sending servers check this record to see if a policy exists or if it has been updated since the last time they checked.

www.mailmodo.com logo
Mailmodo says:
Visit website
You must then add the necessary DNS TXT record so that sending MTAs can discover and retrieve your policy.

This reliance on DNS for discovery does present a potential weakness. As the official RFC 8461 acknowledges, an attacker who can block DNS responses could prevent a sending server from discovering the policy in the first place. This is a known trade-off made to avoid the complexities of requiring DNSSEC.

MTA-STS vs. DANE: a key distinction

The question of DNSSEC often arises from confusion between MTA-STS and a similar, but distinct, protocol called DANE (DNS-Based Authentication of Named Entities). While both aim to secure email in transit, they use different methods.

www.uriports.com logo
URIports Blog says:
Visit website
DANE and MTA-STS serve the same purpose, but DANE requires DNSSEC for DNS authentication, while MTA-STS relies on certification authorities.

As one guide explains, DANE provides its security guarantees by using DNSSEC to bind TLS certificates directly to a domain name in DNS. This approach can be more secure as it removes the reliance on third-party Certificate Authorities, but it has a significant prerequisite: the domain must be fully configured with DNSSEC. Because DNSSEC is not yet universally supported by all DNS providers, this presents a major hurdle for adoption.

MTA-STS was created as a more pragmatic alternative. By not requiring DNSSEC, it allows a far greater number of domains to implement strong transport layer security for their email without needing to tackle a complex DNSSEC deployment first.

Conclusion

To be clear, MTA-STS does not require DNSSEC. Its design deliberately separates policy discovery (via DNS) from policy enforcement (via HTTPS) to make implementation easier. The security of your MTA-STS policy is guaranteed by a valid TLS certificate from a trusted CA, not by DNSSEC.

While you can certainly use DNSSEC for your domain to add an extra layer of protection to the initial DNS lookup, it is not a prerequisite for MTA-STS to function correctly. This accessibility is precisely what has made MTA-STS a popular and effective tool for improving email security across the internet.

Start improving your email deliverability today

Get started