Understanding STARTTLS and secure email transmission
STARTTLS is an SMTP command that upgrades a plain text connection to an encrypted TLS (Transport Layer Security) connection. It allows SMTP servers and clients to start with an unencrypted connection and then negotiate encryption, providing security while maintaining backward compatibility.
STARTTLS is used on port 587 (the submission port) and is the recommended method for securing SMTP connections. It encrypts email transmission, protects authentication credentials, and prevents eavesdropping on email communications.
Test STARTTLS support on your SMTP server using our SMTP server test tool to verify encryption is properly configured.
Client connects to SMTP server on port 587 using a plain text connection. The server responds with its capabilities.
If the server supports STARTTLS, the client sends the STARTTLS command to request encryption upgrade.
Server and client negotiate TLS encryption parameters, including TLS version and cipher suites.
TLS handshake occurs, establishing encrypted connection. Server presents SSL/TLS certificate for verification.
All subsequent communication (including authentication and email transmission) occurs over the encrypted TLS connection.
If STARTTLS is not supported, the connection can continue unencrypted (though this is not recommended for security).
STARTTLS encrypts email content during transmission, preventing interception and eavesdropping.
Encrypts authentication credentials (username and password), preventing credential theft.
TLS ensures data integrity, detecting tampering or modification during transmission.
Certificate validation helps prevent man-in-the-middle attacks by verifying server identity.
STARTTLS helps meet security and compliance requirements for email transmission.
STARTTLS on port 587 is generally recommended as the standard for email submission. Port 465 with implicit SSL/TLS is an alternative that's still widely supported.
Testing STARTTLS support ensures your SMTP server properly supports encrypted connections:
Verify the server advertises STARTTLS support in its capability response (EHLO command).
Test that the STARTTLS command is accepted and successfully upgrades the connection.
Verify TLS handshake completes successfully and encryption is established.
Check SSL/TLS certificate validity, hostname matching, and certificate chain.
Verify that communication after STARTTLS is actually encrypted and secure.
Use our SMTP server test tool to verify STARTTLS support, test encryption, and validate certificate configuration.