Suped

How do PowerMTA's retry-after, max-connect-rate, max-smtp-out, max-msg-per-connection, and max-msg-rate directives work?

Michael Ko profile picture
Michael Ko
Co-founder & CEO, Suped
Published 22 Jul 2025
Updated 16 Aug 2025
6 min read
Managing email sending rates and connection limits is crucial for maintaining good sender reputation and achieving high deliverability. PowerMTA, a robust Mail Transfer Agent (MTA), provides a suite of powerful directives to fine-tune these parameters. Understanding how each of these directives—retry-after, max-connect-rate, max-smtp-out, max-msg-per-connection, and max-msg-rate, operate is essential for any high-volume sender.
These directives allow for granular control over how your MTA interacts with recipient mail servers, helping you navigate the complexities of connection and message limits imposed by various Internet Service Providers (ISPs). Proper configuration can prevent throttling, reduce bounces, and ensure your emails land in the inbox.

Managing sending rates and new connections

PowerMTA's max-msg-rate directive dictates the maximum number of messages that can be sent to a specific domain or group of domains within a defined time interval. This setting is crucial for pacing your outgoing mail and adhering to a recipient's preferred intake rates. For example, max-msg-rate 1000/h limits you to 1000 messages per hour to that specific destination. It's a fundamental control for managing acceptable email sending speeds and preventing your mail from being throttled.
Complementing this is the max-connect-rate directive. Unlike max-msg-rate, which limits messages, max-connect-rate controls the maximum number of *new* SMTP connections PowerMTA will attempt to open to a particular domain within a specified period. For example, max-connect-rate 5/m allows no more than five new connections per minute. This helps prevent overwhelming recipient servers, which can lead to connection refused errors or temporary blocklists. You can see discussions about setting hourly limits in PowerMTA configuration files.
It is critical to distinguish between these two rate-limiting directives. max-msg-rate focuses on the volume of emails, while max-connect-rate focuses on the frequency of initiating new connections. Both play vital roles in managing sending behavior and maintaining a healthy sending reputation.

Controlling concurrent connections

The max-smtp-out directive determines the maximum number of *simultaneous* outbound SMTP connections PowerMTA will establish. This is a crucial setting, as exceeding an ISP's concurrent connection limits can lead to immediate connection drops, deferrals, and potential IP blocklisting. You can apply this setting globally for the entire PowerMTA instance, per virtual MTA (VMTA), or on a per-domain basis.
Meanwhile, max-msg-per-connection specifies how many messages PowerMTA will attempt to send over a single SMTP connection before closing it and opening a new one. A lower value here means more connections will be opened and closed to deliver the same volume of mail, which can impact efficiency if not balanced with max-smtp-out and max-connect-rate. Effective management of these parameters is key to handling email message connection limits.
For example, when sending to microsoft.com logoMicrosoft (Hotmail/Outlook), lower values for max-smtp-out (e.g., 2-4 concurrent connections per IP) and max-msg-per-connection are often recommended because their servers are sensitive to too many simultaneous connections. You can read more about Hotmail throttling and PowerMTA for detailed insights. It's often a process of testing and gradually increasing these values to find the optimal balance for each recipient domain.

The crucial role of retry-after

The retry-after directive tells PowerMTA how long to wait before attempting to resend an email that resulted in a temporary failure (a soft bounce or deferral). This is a critical setting for deliverability, as ISPs often use temporary failures as a way to manage their server load or as part of their anti-spam mechanisms, such as email greylisting.
Setting a retry-after value that is too short, such as one minute, is generally not advisable. Many ISPs expect a longer waiting period for retries to ensure that senders are not aggressively hammering their servers. An overly aggressive retry policy can be perceived as suspicious behavior, potentially leading to your IP address or domain being added to a blacklist, or increasing the likelihood of your emails going to spam folders. This is especially true when dealing with greylisting, where a legitimate server is expected to retry after a short delay.
The default retry-recipients-after value in PowerMTA is often 10 minutes, which is a more commonly accepted interval for initial retries. Adjusting this requires careful consideration of its impact on your email soft bounce retry policies and overall deliverability metrics. ISPs prefer to see a measured, rather than frantic, approach to email delivery.

Warning on aggressive retries

Setting a retry-after value that is too short can be detrimental. It might cause ISPs to view your sending behavior as an attempt to bypass their anti-spam systems or as a sign of a misconfigured server. This perception can lead to your emails being deferred more frequently, blocked, or even result in your IP being placed on a blocklist. Always aim for a retry policy that respects ISP guidelines and industry best practices.

Configuration strategies and balancing directives

Effective PowerMTA configuration requires a holistic approach, understanding how these directives interrelate. For example, if your max-msg-rate is set very high, but max-smtp-out is too low, you won't be able to achieve your desired throughput because you won't have enough concurrent connections to deliver the messages. Similarly, if max-msg-per-connection is low, it will necessitate more connections, which then gets limited by max-connect-rate.
Example PowerMTA configuration snippet
<domain hotmail.com> max-smtp-out 2 max-msg-per-connection 5 max-msg-rate 500/h retry-after 1h <domain yahoo.com> max-smtp-out 10 max-msg-per-connection 10 max-msg-rate 2000/h retry-after 30m
It's essential to tailor these settings to the specific requirements and behaviors of individual mailbox providers. For instance, Google's connection settings might be more lenient than Yahoo's SMTP connection limits. Regular monitoring of your mail logs and bounce data will provide insights into which directives need adjustment. You can explore more essential PowerMTA configuration tips for optimizing your setup.

Directive

Function

Impact on deliverability

retry-after
Time before retrying a deferred message
Too short can be seen as aggressive, leading to blocks or blacklisting
max-connect-rate
Max new connections per time period
Prevents overwhelming recipient servers
max-smtp-out
Max simultaneous open connections
Crucial for avoiding ISP throttling and connection drops
max-msg-per-connection
Max messages per single SMTP connection
Affects connection efficiency and frequency of new connections
max-msg-rate
Max messages sent per time period
Essential for adhering to volume limits and avoiding throttling

Conclusion

Mastering these PowerMTA directives is key to achieving optimal email deliverability, especially for high-volume sending. Each directive plays a unique role in regulating your email flow, from managing concurrent connections to controlling retry intervals. By carefully configuring and continuously monitoring these settings, you can ensure your email infrastructure remains compliant with ISP policies, maintains a strong sender reputation, and maximizes inbox placement. Remember to adapt your configurations based on the specific requirements of each mailbox provider and to monitor your performance closely to make necessary adjustments.

Views from the trenches

Best practices
Always align your PowerMTA directive settings with the specific recommendations or observed behaviors of major mailbox providers. Different ISPs have varying tolerance levels for connection and message rates.
Prioritize a gradual warm-up approach for new IPs or domains. Start with conservative `max-msg-rate` and `max-smtp-out` values, increasing them slowly over time to build a positive sender reputation and trust with ISPs.
Regularly review your PowerMTA logs and bounce reports. These provide invaluable data on how mailbox providers are reacting to your sending patterns, indicating where directive adjustments might be necessary.
Common pitfalls
Setting `retry-after` too low, such as 1 minute, can be seen as aggressive behavior by ISPs, potentially leading to hard blocks or greylisting, and damaging your sender reputation.
Ignoring the interplay between directives, for example, a high `max-msg-rate` with a low `max-smtp-out` will lead to message queuing and missed delivery windows.
Applying a one-size-fits-all configuration across all recipient domains. Generic settings often fail to optimize for specific ISP requirements and can result in throttling or deferrals.
Expert tips
For highly sensitive domains like Microsoft (Outlook/Hotmail), set `max-smtp-out` and `max-msg-per-connection` to very low values, such as 2-4 concurrent connections, especially if using a single IP address. This helps avoid throttling.
Consider using virtual MTAs (VMTAs) to segregate sending traffic by recipient domain or message type. This allows for more tailored directive configurations, optimizing deliverability for diverse audiences.
Actively manage your queues. If you notice a queue building up for a specific domain due to throttling, consider rerouting traffic to other VMTAs or even other PMTA instances if available.
Marketer view
Marketer from Email Geeks says that setting a `retry-after` value of one minute is likely too short and might cause issues, advising a longer interval.
2021-08-03 - Email Geeks
Expert view
Expert from Email Geeks says that aggressive retry settings can backfire, and suggests checking the `retry-recipients-after` value, which defaults to 10 minutes, as it specifies the minimum recipient-level retry interval.
2021-08-03 - Email Geeks

Frequently asked questions

DMARC monitoring

Start monitoring your DMARC reports today

Suped DMARC platform dashboard

What you'll get with Suped

Real-time DMARC report monitoring and analysis
Automated alerts for authentication failures
Clear recommendations to improve email deliverability
Protection against phishing and domain spoofing