TLS (Transport Layer Security) is the mechanism by which two email servers, when communicating, can automatically negotiate an encrypted channel between them so that the emails transmitted are secured from eavesdroppers.
It is becoming ever more important to use a company that supports TLS for email transmission as more and more banks, health care, and other organizations who have any kind of security policy are requiring their vendors and clients to use this type of encryption for emailed communications with them. Additionally, if your email provider supports TLS for email transmission, and you are communicating with people whose providers do also, then you can be sure that all of the email traffic between you and them will be encrypted.
How do you find out if someone to whom you are sending email uses a provider whoÃ¢â‚¬â„¢s servers support TLS-encrypted communications? We will take you through the whole process step-by-step, but first let us note some important truths about TLS connection encryption.
- The use of TLS encryption is negotiated/determined each and every time two servers connect to each other to transmit your email.
- Just because a server supports TLS today, does not mean that it will tomorrow Ã¢â‚¬â€ server configurations can change and mistakes can be made.You can, however, be sure that an email will never be sent to someone without TLSÃ‚Â Ã¢â‚¬â€œ see Enforcing Email Security with TLS when Communicating with Banks.
- If your email is passed between more than one server, then the security of each server-to-server connection along the way needs to be negotiated separately.
- Only the recipientÃ¢â‚¬â„¢s externally facing email servers can be checked for TLS support. There is no way of checking the back-end servers of a service providerÃ¢â‚¬â„¢s email system to make sure TLS is supported all the way to delivery to the recipientÃ¢â‚¬â„¢s mailbox.
- Even if the senderÃ¢â‚¬â„¢s email servers and the recipientÃ¢â‚¬â„¢s email servers are configured to use TLS, both parties still need to configure their email clients to connect securely to their respective servers (for the initial sending of the message, and for the final download and viewing of the message) in order to ensure that the email message is transmitted securely during its entire trek from sender to receiver.
To check for TLS you need to use a program called Ã¢â‚¬Å“telnetÃ¢â‚¬Â, which is another command prompt utility that exists in all of the operating systems mentioned. Telnet will be used to simulate the SMTP connection to the server; once connected, we will issue the Ã¢â‚¬ÂehloÃ¢â‚¬Â command. If the server supports TLS encryption then we will see Ã¢â‚¬Å“250-STARTTLSÃ¢â‚¬Â in the list of supported options.
The following steps will need to be repeated for every server provided by your query for MX records. To use the Telnet program type, Ã¢â‚¬Å“telnet server_name 25Ã¢â‚¬Â, replacing Ã¢â‚¬Å“server_nameÃ¢â‚¬Â with the name of a mail server from your DNSÃ‚Â query and press Ã¢â‚¬Å“EnterÃ¢â‚¬Å“. (25 is the standard SMTP port at which that all public inbound email servers must be listening for connections). A few lines will appear, the last starting with Ã¢â‚¬Å“220Ã¢â‚¬Â and containing the date.
support$ telnet mx1.md3v.net 25
Connected to mx1.md3v.net.
Escape character is Ã¢â‚¬Ëœ^]Ã¢â‚¬â„¢.
220 mx1.md3v.net ESMTP Sendmail 8.13.1/8.13.7; Thu, 05 Dec 2009 10:11:18 -0600
Now type Ã¢â‚¬Å“ehloÃ¢â‚¬Â followed by a domain name, your own domain name will work fine, and press Ã¢â‚¬Å“EnterÃ¢â‚¬Å“. If you see within the results the line, Ã¢â‚¬Å“250-STARTTLSÃ¢â‚¬Â, then that email server is configured to support use of TLS. Here is a full example:
250-mx1.md3v.net Hello static-222-111-111-222.myinternet.net [184.108.40.206], pleased to meet you
250-AUTH DIGEST-MD5 CRAM-MD5
221 2.0.0 mx1.md3v.net closing connection
Connection closed by foreign host.
Once again you will need to repeat this telnet step for each email server listed in the MX records to be sure that TLS support is enabled on all servers processing email for email address in that domain.
Use of TLS is good practice and very secure when you know that it is implemented through the entire chain of delivery.