For more info, click on the categories in the report table!
Your Score: 10/10
| Email Delivery | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Transport | ||||||||||||||||||||||||||||||||||||||||
|
When sending emails, your mailprovider supports IPv4 email delivery.
|
||||||||||||||||||||||||||||||||||||||||
|
When sending emails, your mailprovider supports IPv6 email delivery. While receiving emails over IPv6 poses new challenges to spam prevention, IPv4 is running out, and it is time to get IPv6 ready! |
||||||||||||||||||||||||||||||||||||||||
|
Greylisting is an anti-spam measure. It leverages that many spammers do not queue emails by sending a temporary error to any unknown combination of sender IP address, MAIL FROM, and RCPT TO. A valid sender will try to redeliver the email during a certain timeframe (usually 24 hours to a few days). When sending emails, your mailprovider attempts re-delivery (supports sending to servers using greylisting). |
||||||||||||||||||||||||||||||||||||||||
| TLS / Encryption | ||||||||||||||||||||||||||||||||||||||||
✅ 💡 |
||||||||||||||||||||||||||||||||||||||||
|
Note: Plaintext delivery is supported; While technically insecure, there are still some mailservers in production that do not support TLS, so it might make sense to allow plaintext delivery.Your email provider/server supports emails in cleartext if the STARTTLS option is not presented by the receiver or stripped from the communication. |
||||||||||||||||||||||||||||||||||||||||
✅ 💡 |
||||||||||||||||||||||||||||||||||||||||
|
Note: The mailserver supports medium strength ciphers; While a little less secure, this improves deliverability over just supporting strong ciphers.Transport encryption protects emails from passive eavesdropping on the way from the sender to the receiver. Still both the sending and the receiving email servers and every email server on the path from the sender to the receiver sees the email in cleartext.
|
||||||||||||||||||||||||||||||||||||||||
✅ 💡 |
||||||||||||||||||||||||||||||||||||||||
|
Note: Opportunistic encryption (accepting any certificate) is supported; While technically insecure, there are still some mailservers in production that do not support validated TLS connections, so opportunistic encryption is better than nothing.Transport encryption for email is mostly opportunistic. Expired and self-signed certificates are treated as valid. In case of an error the SMTP connection will fall back to plaintext. However, this makes email delivery vulnerable to spoofing and Monkey-in-the-middle (MITM) attacks. To measure how your email provider/server treats invalid certificates, mail-tls-invalid.measurement.email-security-scans.org presents an expired certificate with a non-matching CN entry. Your email provider/server supports |
||||||||||||||||||||||||||||||||||||||||
|
Domain-based Authentication of Named Entities (DANE) is a more recent standard that allows to publish certificate information in DNS with TLSA records. A sender is then able to verify the certificate of the receiving email server based on the information in the TLSA record. This also indicates that the receiver supports encryption before initiating a STARTTLS connection. To guaratanee validity of the certificate information, DANE only works in combination with DNSSEC.
References: APNIC - Better mail security with DANE for SMTP [EN] |
||||||||||||||||||||||||||||||||||||||||
|
MTA-Strict Transport Security enables strict transport encryption for domains without DNSSEC.
To test your inbound MTA-STS policy (and more!), run the e-mail test from Internet.nl: Internet.nl E-Mail Test [EN] |
||||||||||||||||||||||||||||||||||||||||
✅ 💡 |
||||||||||||||||||||||||||||||||||||||||
|
Your mailserver sends out TLS reports, and we received a report at 2026-04-23T00:05:28 (Download)
|
||||||||||||||||||||||||||||||||||||||||
| DNS | ||||||||||||||||||||||||||||||||||||||||
| DNS Resolution | ||||||||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||||||||
|
The DNS resolver, your email provider/server relies on, supports DNS resolution over IPv6. |
||||||||||||||||||||||||||||||||||||||||
|
The DNS resolver your email provider/server relies on, supports DNSSEC. |
||||||||||||||||||||||||||||||||||||||||
| DNS Configuration of Your Zones/Mailservers | ||||||||||||||||||||||||||||||||||||||||
|
Here, we test whether a recursive DNS server that only supports IPv6 can resolve all names/zones relevant for your email setup. All zones your mailsetup depends upon are IPv6 resolvable. |
||||||||||||||||||||||||||||||||||||||||
|
Some names needed for email delivery are not DNSSEC signed. This is important to verify the authenticity and integrity of SPF, DKIM, DANE, reverse DNS, and DMARC entries.
|
||||||||||||||||||||||||||||||||||||||||
| Sending Host Configuration & Authenticated Sender | ||||||||||||||||||||||||||||||||||||||||
|
|
||||||||||||||||||||||||||||||||||||||||
|
Your SPF policy is valid and needs less than 10 additional DNS queries.
|
||||||||||||||||||||||||||||||||||||||||
|
DomainKeys Identified Mail (DKIM) allows claiming responsibility for an email by cryptographically sigining it. It prevents forgery and spam. Your mailsetup uses DKIM. All DKIM signatures are valid and in good order.
|
||||||||||||||||||||||||||||||||||||||||
|
Domain-based Message Authentication, Reporting and Conformance (DMARC) was introduced to let the receiver know, how to react to SPF and DKIM validation results and enable reporting.
|
||||||||||||||||||||||||||||||||||||||||
|
You have the following addresses configured to receive DMARC reports:
|
||||||||||||||||||||||||||||||||||||||||
|
Your mail-setup is IPv6 ready! IPv6 mail delivery, DNS resolution, and IPv6 support for all zones you depend on works! |
||||||||||||||||||||||||||||||||||||||||
| Message Basics | ||||||||||||||||||||||||||||||||||||||||
|
No duplicate headers found. |
||||||||||||||||||||||||||||||||||||||||
|
No missing headers found. |
||||||||||||||||||||||||||||||||||||||||
|
Envelope From and Mail From domains always match. |
||||||||||||||||||||||||||||||||||||||||
| Measurement Target | Description | Sent | Received | By MTA |
|---|---|---|---|---|
| challenge_mail_plaintext | This address is reachable via IPv4 and IPv6, but only allows plaintext connections. If you cannot send an email here, your mailserver does not support plaintext emails. | plaintext.measurement.email-security-scans.org | ||
| challenge_v4_mail | This address is only reachable via IPv4, and accepts plaintext connections and as many ciphers and TLS versions as possible. If you cannot send an email here, your mailserver does not support sending emails via IPv4. | mail.measurement.email-security-scans.org | ||
| challenge_v6_mail | This address is only reachable via IPv6, and accepts plaintext connections and as many ciphers and TLS versions as possible. If you cannot send an email here, your mailserver does not support sending emails via IPv6. | mail.measurement.email-security-scans.org | ||
| challenge_v4_mail_v6only | Like measurement@v4-mail.measurement.email-security-scans.org, but the domain can only be resolved via IPv6. If you cannot send an email here, but to measurement@v4-mail.measurement.email-security-scans.org, your mailserver's DNS resolver does not support IPv6 DNS resolution. | mail.measurement.email-security-scans.org | ||
| challenge_v6_mail_v6only | Like measurement@v6-mail.measurement.email-security-scans.org, but the domain can only be resolved via IPv6. If you cannot send an email here, but to measurement@v6-mail.measurement.email-security-scans.org, your mailserver's DNS resolver does not support IPv6 DNS resolution. | mail.measurement.email-security-scans.org | ||
| challenge_v4_mail_dnssec_broken | Like measurement@v4-mail.measurement.email-security-scans.org, but DNSSEC is broken. If you can send an email to measurement@v4-mail.measurement.email-security-scans.org and this address, your mailserver's DNS resolver does not support DNSSEC. | |||
| challenge_v6_mail_dnssec_broken | Like measurement@v6-mail.measurement.email-security-scans.org, but DNSSEC is broken. If you can send an email to measurement@v6-mail.measurement.email-security-scans.org and this address, your mailserver's DNS resolver does not support DNSSEC. | |||
| challenge_v4_mail_greylisting | Like measurement@v4-mail.measurement.email-security-scans.org, but our server implements greylisting. If you can send an email to measurement@v4-mail.measurement.email-security-scans.org and this address, your mail server queues temporarily undeliverable mails and reattempts delivery (as it should). | greylisting.measurement.email-security-scans.org | ||
| challenge_v6_mail_greylisting | Like measurement@v6-mail.measurement.email-security-scans.org, but our server implements greylisting. If you can send an email to measurement@v6-mail.measurement.email-security-scans.org and this address, your mail server queues temporarily undeliverable mails and reattempts delivery (as it should). | greylisting.measurement.email-security-scans.org | ||
| challenge_mail_tls_force | This address is reachable via IPv4 and IPv6, but enforces TLS use with as many ciphers and TLS versions as possible, presenting a valid certificate. If you cannot send an email here, your mailserver does not support (newer than SSLv3) TLS for outbound connections. | tls-force.measurement.email-security-scans.org | ||
| challenge_mail_tls_invalid | Like measurement@mail-tls-force.measurement.email-security-scans.org, but the certificate is invalid (non-matching and expired). If you can send an email to measurement@mail-tls-force.measurement.email-security-scans.org, but not here, your mailserver validates | tls-invalid.measurement.email-security-scans.org | ||
| challenge_mail_tlsa_invalid | Like measurement@mail-tls-invalid.measurement.email-security-scans.org, but with an invalid TLSA record. If you could send to measurement@mail-tls-invalid.measurement.email-security-scans.org but not here, your mailserver validates DANE. | |||
| challenge_mail_tlsv13 | Like measurement@mail-tls-force.measurement, but enforcing TLSv1.3; If you can deliver an email here, your mailserver supports TLSv1.3. | tlsv13.measurement.email-security-scans.org | ||
| challenge_mail_notlsv13 | Like measurement@mail-tls-force.measurement, but not supporting TLSv1.3; If you cannot deliver an email here, you mailserver enforces at least TLSv1.3. | notlsv13.measurement.email-security-scans.org | ||
| challenge_mail_strong_force_tls | Like measurement@mail-tls-force.measurement.email-security-scans.org, but only supporting high cipher settings according to https://www.sidn.nl/en/modern-internet-standards/hands-on-implementing-dane-in-postfix; implies no TLSv1.0 and no TLSv1.1. If no mail is received, your mailserver does not support strong ciphers. | strong-force-tls.measurement.email-security-scans.org | ||
| challenge_mail_medium_force_tls | Like measurement@mail-tls-force.measurement.email-security-scans.org, but only supporting medium cipher settings according to https://www.sidn.nl/en/modern-internet-standards/hands-on-implementing-dane-in-postfix; implies no TLSv1.0 and no TLSv1.1. If no mail is received, your mailserver does not support medium strength ciphers. | medium-force-tls.measurement.email-security-scans.org | ||
| challenge_uniq | Includes a unique random ID for your email test, which helps us to tie DMARC bounces and TLS-RPT messages to your emails. | mail.measurement.email-security-scans.org | ||
| challenge_dns | Includes a unique random ID for your email test, which helps us to tie your DNS resolver to your emails. | mail.measurement.email-security-scans.org | ||
| challenge_mail_mtasts_n_iv | If an email is received, the remote does not validate MTA-STS if the policy is delimited with \n; If a mail is not received for plain but here, the remote uses MTA-STS only to force opportunistic encryption. | |||
| challenge_mail_mtasts_rn_iv | If an email is received, the remote does not validate MTA-STS if the policy is delimited with \r\n; If a mail is not received for plain but here, the remote uses MTA-STS only to force opportunistic encryption. | |||
| challenge_mail_mtasts_rn_plain | If an email is received, the remote does not validate MTA-STS if the policy is delimited with \r\n; If a mail is received here, most likely no MTA-STS takes place. | |||
| challenge_mail_mtasts_rn_mult_ivv | If an email is received, check if it came via tls-force or tls-invalid; If it came via tls-invalid, MTA-STS processing is broken (see options above). | tls-force.measurement.email-security-scans.org | ||
| challenge_mail_mtasts_rn_mult_ivp | If an email is received, check if it came via tls-invalid or plaintext; If it came via plaintext, MTA-STS processing is broken (see options above); If it came via tls-invalid, see the options abvoe for mtasts-n/rn-iv re: opportunistic encryption. | |||
| challenge_mail_tlsaivv | TLSA invalid / Valid Certificate / No MTA-STS; If TLSA is supported in other tests, the remote preferrs PKIX over TLSA | |||
| challenge_mail_tlsaviv | TLSA valid / Invalid Certificate / No MTA-STS; This case should be delivered by remotes that support TLSA, even if they perform strong TLS enforcing (see plaintext result) | tls-invalid.measurement.email-security-scans.org | ||
| challenge_mail_mtastsv_tlsaivv_rn | TLSA Invalid / Valid Certificate / Valid MTA-STS n; Should not be delivered if TLSA is correctly preferred over MTA-STS and both are supported (see other tests); \r\n delimiting | |||
| challenge_mail_mtastsiv_tlsaviv_rn | TLSA Valid / Invalid Certificate / Invalid MTA-STS; Should be delivered if TLSA is correctly preferred over MTA-STS and both are supported (see other tests); \r\n delimiting | tls-invalid.measurement.email-security-scans.org | ||
| challenge_mail_mtastsiv_tlsavv_rn | TLSA Valid / Valid Certificate / Invalid MTA-STS; Should be delivered if TLSA is correctly preferred over MTA-STS and both are supported (see other tests); \r\n delimiting | tls-force.measurement.email-security-scans.org | ||
| challenge_mail_tlsa_invalid_nodnssec | TLSA Invalid / Invalid Certificate; If TLSA is supported as well as opportunistic encryption, this should be delivered as the TLSA record should not work on a non-DNSSEC signed domain; If it is, DNSSEC is ignored for TLSA. | tls-invalid.measurement.email-security-scans.org | ||
| challenge_mail_tlsa_valid_nodnssec | TLSA Invalid / Valid Certificate; If TLSA is supported as well as encryption, this should be delivered as the TLSA record should not work on a non-DNSSEC signed domain; If it is, DNSSEC is ignored for TLSA. Uses a PKIX valid cert to catch cases where remotes enforce valid certs. | tls-force.measurement.email-security-scans.org |