Skip to main content

New

Test your email deliverability

Send a test email and get a complete diagnosis of your SPF, DKIM and DMARC authentication in seconds.

  • Real send test
  • Instant diagnosis
  • No signup required

Free MTA-STS Checker

Lookup and validate MTA-STS policy, DNS record & TLS certificate instantly

Free MTA-STS checker to validate your domain's email security configuration. Our MTA-STS lookup tool checks DNS TXT records, fetches HTTPS policy files, verifies TLS certificates, and cross-validates MX patterns against actual mail servers—all in one click.

DNS record lookup

Queries the _mta-sts TXT record and parses version and ID fields. Detects missing or malformed records.

HTTPS policy fetch

Fetches and parses the .well-known/mta-sts.txt file. Validates mode, MX patterns, and max_age directives.

TLS certificate check

Verifies the HTTPS certificate for the policy URL. Reports TLS version and certificate validity.

MX pattern validation

Cross-checks MX records against policy patterns. Identifies any mail servers not covered by the policy.

Detailed diagnostics

Get errors, warnings, and recommendations. Understand exactly what needs to be fixed for full compliance.

What This Tool Checks

The MTA-STS record checker performs a comprehensive validation of your domain's MTA-STS implementation:

1. DNS TXT Record Check

Queries _mta-sts.yourdomain.com and validates:

  • Record exists
  • Version is STSv1
  • ID field is present and valid
  • No syntax errors

2. Policy File Fetch

Fetches https://mta-sts.yourdomain.com/.well-known/mta-sts.txt and checks:

  • HTTPS is required (no HTTP)
  • No redirects (direct access only)
  • Valid Content-Type header
  • File is accessible

3. Policy Content Validation

Parses the policy file and validates:

  • Version is STSv1
  • Mode is testing, enforce, or none
  • At least one MX pattern defined
  • max_age is within valid range

4. TLS Certificate Verification

Checks the HTTPS certificate for mta-sts.yourdomain.com:

  • Certificate is valid and not expired
  • Hostname matches
  • Certificate chain is complete
  • TLS version is adequate

5. MX Pattern Cross-Validation

Compares your domain's MX records against policy patterns:

  • All MX hosts should match at least one pattern
  • Warns about uncovered MX servers
  • Detects wildcards that may be too broad

Understanding the Results

Status Indicators

StatusMeaning
PassConfiguration is correct
WarningWorks but could be improved
ErrorConfiguration problem that needs fixing
Not FoundRecord or policy doesn't exist

Common Issues and Fixes

IssueCauseFix
No DNS record_mta-sts TXT not publishedAdd the TXT record to DNS
Policy fetch failedmta-sts subdomain not set upCreate subdomain with HTTPS
TLS errorCertificate issueFix/renew the SSL certificate
MX not coveredMissing MX patternAdd the MX host to policy
Mode is noneMTA-STS disabledChange mode to testing or enforce

MTA-STS Deployment Status

Fully Configured

  • DNS record exists with valid format
  • Policy file accessible over HTTPS
  • TLS certificate valid
  • All MX servers covered by patterns
  • Mode is enforce

Partially Configured

  • DNS record exists but policy issues
  • TLS warnings (e.g., soon-to-expire cert)
  • Some MX servers not covered
  • Mode is testing

Not Configured

  • No DNS record found
  • Policy file not accessible
  • Mode is none

Best Practices

Before Going to Enforce Mode

  1. Test thoroughly - Run in testing mode for at least 1 week
  2. Check MX coverage - All MX servers must match policy patterns
  3. Monitor TLS-RPT - Set up TLS reporting to catch issues
  4. Verify certificates - Ensure mta-sts subdomain cert is valid
  5. Test from multiple sources - Check from different networks

Maintaining MTA-STS

  1. Update policy ID when changing the policy file
  2. Monitor certificate expiry for mta-sts subdomain
  3. Update MX patterns when adding/removing mail servers
  4. Review TLS-RPT reports regularly
  5. Re-check after DNS changes

Comparison: MTA-STS vs DANE

FeatureMTA-STSDANE
DNS SecurityNo DNSSEC requiredRequires DNSSEC
Setup ComplexityModerate (DNS + HTTPS)Complex (DNSSEC + TLSA)
Certificate PinningNo (trust model based)Yes (TLSA records)
AdoptionGrowingLimited
ReportingTLS-RPTNone standard

MTA-STS is easier to deploy and doesn't require DNSSEC, making it more accessible for most organizations.


FAQ - Frequently asked questions

Q: What does the MTA-STS record checker validate?

A: The checker performs a complete validation: DNS TXT record at _mta-sts.domain.com, HTTPS policy file at mta-sts.domain.com/.well-known/mta-sts.txt, TLS certificate validity, and cross-validation of MX records against policy patterns.


Q: Why is my MTA-STS policy not being fetched?

A: Common causes: the mta-sts subdomain doesn't exist, HTTPS is not configured, the certificate is invalid, the policy file path is wrong, or the server returns redirects (not allowed).


Q: What does 'MX not covered by policy' mean?

A: This warning means one or more of your domain's MX records don't match any pattern in your MTA-STS policy. Add the missing MX patterns to your policy file to ensure all mail servers are covered.


Q: Why does the checker show TLS errors?

A: MTA-STS requires the policy file to be served over HTTPS with a valid certificate. TLS errors can mean: expired certificate, self-signed certificate, hostname mismatch, or outdated TLS version.


Q: What's the difference between testing and enforce mode?

A: In "testing" mode, sending servers report TLS failures but still deliver email. In "enforce" mode, delivery is rejected if TLS fails. Use testing first to identify issues.


Q: How often should I check my MTA-STS configuration?

A: Check after any changes to DNS, MX records, or mail server configuration. Also verify after certificate renewals. Regular monthly checks help catch issues early.


Complementary tools

ToolDescription
MTA-STS GeneratorGenerate MTA-STS records and policy files
MTA-STS Syntax CheckerValidate MTA-STS syntax offline
MX Record LookupCheck domain MX records

Useful resources