Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 764

Opportunistic TLS

What is Opportunistic TLS?

Opportunistic TLSAn encryption posture in which two parties use TLS when both support it and fall back to plaintext otherwise, typical of SMTP between mail servers using STARTTLS without strong authentication.


Opportunistic TLS is the default behavior of SMTP STARTTLS (RFC 3207) and similar protocols where TLS is preferred but not mandatory. If the peer does not advertise TLS, certificate validation fails, or the handshake errors out, the sender silently retries in cleartext to preserve delivery. This protects against passive eavesdropping but not active attackers, who can strip the STARTTLS announcement, present untrusted certificates, or downgrade ciphers. To harden opportunistic TLS, operators deploy MTA-STS (RFC 8461) for policy-based enforcement, DANE/TLSA (RFC 7672) for DNSSEC-anchored authentication, SMTP TLS Reporting (RFC 8460) for visibility, and TLS 1.2/1.3 with strong cipher suites.

Examples

  1. 01

    An outbound MTA encrypts mail to a partner domain when STARTTLS works but falls back to plaintext if the handshake fails.

  2. 02

    Postfix configured with smtp_tls_security_level=may, illustrating the default opportunistic posture.

Frequently asked questions

What is Opportunistic TLS?

An encryption posture in which two parties use TLS when both support it and fall back to plaintext otherwise, typical of SMTP between mail servers using STARTTLS without strong authentication. It belongs to the Network Security category of cybersecurity.

What does Opportunistic TLS mean?

An encryption posture in which two parties use TLS when both support it and fall back to plaintext otherwise, typical of SMTP between mail servers using STARTTLS without strong authentication.

How does Opportunistic TLS work?

Opportunistic TLS is the default behavior of SMTP STARTTLS (RFC 3207) and similar protocols where TLS is preferred but not mandatory. If the peer does not advertise TLS, certificate validation fails, or the handshake errors out, the sender silently retries in cleartext to preserve delivery. This protects against passive eavesdropping but not active attackers, who can strip the STARTTLS announcement, present untrusted certificates, or downgrade ciphers. To harden opportunistic TLS, operators deploy MTA-STS (RFC 8461) for policy-based enforcement, DANE/TLSA (RFC 7672) for DNSSEC-anchored authentication, SMTP TLS Reporting (RFC 8460) for visibility, and TLS 1.2/1.3 with strong cipher suites.

How do you defend against Opportunistic TLS?

Defences for Opportunistic TLS typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Opportunistic TLS?

Common alternative names include: Opportunistic Encryption, Best-Effort TLS.

Related terms