Opportunistic SSL/TLS encryption on outgoing emails

Post categories

Profile picture for Rob Mueller

Founder & CTO

Early last year, we implemented opportunistic encryption of
incoming emails
. We’ve now done the same thing for outgoing emails. This means that for email sent via FastMail (either the web interface or SMTP), if the receiving server advertises STARTTLS support in response to an EHLO command, we will try and negotiate a secure connection and send the email over a secure connection. However if the negotiation fails for any reason, we’ll fallback to a standard connection.

Some extra notes on this:

  • This doesn’t change what happens when sending via SMTP from your
    email client/software (eg. Outlook, Apple Mail, Thunderbird, etc) to
    the FastMail servers. Whether that connection is encrypted is
    controlled by your email client/software and what you configured
    when you set it up
  • We can’t force a remote server to use encryption, it’s only if the
    remote server advertises support for encryption that we try and
    setup a secure channel
  • This is not full end-to-end encryption of the email. The email is
    only encrypted during transit from our server to the other server,
    once it’s at their side, it’s stored in whatever form the other side
    stores emails. For full end-to-end encryption, you need something
    like PGP
  • The only way to tell if an email has gone over an encrypted
    connection or not is to look at the headers of the email on the
    received side. In other words, as a sender, it’s unfortunately
    not easy to tell, only the receiver can easily tell

Since this feature is only enabled if the other side advertises support for it, it shouldn’t affect sending to servers that don’t support STARTTLS, and thus shouldn’t affect the deliverability of email in any
way.

Profile picture for Rob Mueller

Founder & CTO