Copyright © 1999–2017 FastMail Pty Ltd
FastMail now enables opportunistic SSL/TLS encryption on incoming emails. This means we now advertise STARTTLS support in response to an EHLO command on our MX servers.
Trying 22.214.171.124...Connected to mx1.messagingengine.com.Escape character is '^]'.220 mx1.messagingengine.com ESMTP . No UCE permitted.EHLO blah.com250-mx1.messagingengine.com250-PIPELINING250-SIZE 71000000250-ETRN250-STARTTLS250-ENHANCEDSTATUSCODES250 8BITMIME
If the server sending the email to FastMail supports it, it will enable an SSL/TLS connection and send the email to FastMail over an encrypted connection. Some extra notes:
- At the moment, this only affects the sending of email from another server to FastMail, not from FastMail to another server, though we are looking into this
- We can't force a remote server to use encryption, it's up to the remote server to detect that we support it and then enable it before sending the email
- This is not full end-to-end encryption of the email. The email is only encrypted during transit from the other server to us, once at our side, it's stored unencrypted again. For full end-to-end encryption, you need something like PGP
- Encrypted connections have extra headers added to the email so you can see the transmission was encrypted. An example:
Received: from remoteserver.com (remoteserver.com [a.b.c.d]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.messagingengine.com (Postfix) with ESMTPS id 8FDBA27063B for <firstname.lastname@example.org>; Wed, 15 Apr 2009 23:28:29 -0400 (EDT)
Since this feature is entirely optional, it shouldn't affect any sending servers that don't support STARTTLS, and thus shouldn't affect the deliverability of email in any way.