Quick Answer

A complete email server configuration check covers SMTP port reachability, TLS configuration, authentication (SPF/DKIM/DMARC), reverse DNS, blocklist status, RCPT TO behavior, and bounce handling. Use MXToolbox SuperTool for one-shot DNS-side checks, swaks for SMTP-level testing, and Mail-Tester for end-to-end validation. Takes 30 minutes for a thorough audit.

Email Configuration Check: Test Your Mail Server

By Braedon·Mailflow Authority·Email Deliverability·Updated 2026-05-16

A mail server configuration check is the email equivalent of a server health check — running specific tests against specific layers to confirm everything works. Most senders only test the obvious surface (does mail get delivered?) and miss the deeper configuration issues that erode reputation over months. This guide walks through the full audit.

The layers to test

LayerWhat to checkTools
DNS recordsMX, SPF, DKIM, DMARC, PTRMXToolbox SuperTool, dig
SMTP transportPorts, TLS, AUTH, RCPT TOswaks, telnet
Authentication validitySignature, alignment, passMail-Tester, Mailhardener
End-to-end deliveryTest send to real recipientsSeed accounts, Mail-Tester
Blocklist statusIP and domain reputationHetrixTools, Spamhaus
Bounce handlingHard/soft bounce processingESP logs, MTA queue

Skip a layer and you'll have blind spots.

Layer 1: DNS records

Check each required record exists and is correctly formatted.

MX records

dig MX yourdomain.com +short

Should return your mail-receiving server(s) with priority values. Missing MX = inbound mail doesn't route.

SPF

dig TXT yourdomain.com +short | grep spf

Should return one v=spf1 ... record. Common issues: missing record, multiple records (RFC violation), too many DNS lookups (>10 = fails), missing ~all or -all qualifier.

See SPF setup and SPF flattening.

DKIM

dig TXT selector._domainkey.yourdomain.com +short

Replace selector with your DKIM selector (commonly default, google, mail, or ESP-specific). Should return a v=DKIM1; ... record with the public key. Missing or malformed = DKIM fails on all sends.

See DKIM setup and DKIM key rotation.

DMARC

dig TXT _dmarc.yourdomain.com +short

Should return v=DMARC1; p=quarantine; rua=mailto:... (or p=reject). p=none is monitoring-only and doesn't trigger enforcement signals at ISPs.

See DMARC setup and DMARC none to reject.

PTR (reverse DNS)

dig -x 198.51.100.42 +short

Should return a hostname that resolves back to the same IP (forward-confirmed reverse DNS, FCrDNS). Missing or mismatched PTR is a common reason for SMTP rejections.

Layer 2: SMTP transport

Test that the mail server responds correctly on the right ports with the right TLS configuration.

Port reachability

nc -zv mail.yourdomain.com 25
nc -zv mail.yourdomain.com 587
nc -zv mail.yourdomain.com 465

Confirm each expected port responds. Port 25 for MTA-to-MTA relay; 587 for authenticated submission (preferred); 465 for legacy implicit-TLS submission.

TLS

openssl s_client -connect mail.yourdomain.com:465 -showcerts
openssl s_client -starttls smtp -connect mail.yourdomain.com:587

Check: certificate is valid (not expired, matches hostname), TLS version is 1.2 or 1.3, certificate chain is complete.

For MTA-STS / TLS-RPT, also verify those records:

dig TXT _mta-sts.yourdomain.com +short
dig TXT _smtp._tls.yourdomain.com +short

See MTA-STS setup.

Full SMTP transaction with swaks

swaks --to [email protected] \
      --from [email protected] \
      --server mail.yourdomain.com:587 \
      --tls \
      --auth-user user \
      --auth-password pass \
      --header "Subject: Configuration test"

Full transcript shows EHLO, AUTH, MAIL FROM, RCPT TO, DATA, response codes. Identifies any failure point.

Practitioner note: swaks is the most-undervalued tool in email diagnostics. A single command tests TLS, auth, RCPT TO, and content delivery while showing the complete SMTP transcript. I use it constantly during deliverability audits to isolate which layer is failing. Most senders never install it because their ESP hides the SMTP layer entirely.

Layer 3: Authentication validity

DNS records present is not the same as authentication passing on real sends. Validate end-to-end:

  • Mail-Tester — send a test message, get full SPF/DKIM/DMARC validation in the report
  • Mailhardener — ongoing authentication monitoring with DMARC report aggregation
  • MXToolbox SuperTool DMARC report — checks alignment on a sample message
  • Aspmx.l.google.com Authentication-Results — actually send to a Gmail account you control, view full headers

The Authentication-Results header in the actual delivered message is the ground truth.

Layer 4: End-to-end delivery

Send test messages to seed accounts across major ISPs. Confirm:

  • Message arrives (not bounced)
  • Message lands in Inbox (not spam/junk)
  • Authentication-Results show pass for all three
  • Display formatting renders correctly
  • Links work

Manually check Gmail, Outlook.com, Yahoo, Apple Mail at minimum. Free if you maintain your own seed accounts; paid tools (GlockApps) automate.

Layer 5: Blocklist status

1. MXToolbox blacklist check on sending IP
2. MXToolbox blacklist check on sending domain
3. Spamhaus direct check
4. HetrixTools ongoing monitoring

See RBL test guide and email blacklists guide.

Layer 6: Bounce handling

Confirm:

  • Hard bounces (550) suppress the recipient immediately
  • Soft bounces (4xx) retry per RFC timing (typically 4 attempts over 48 hours)
  • Bounce processing is enabled in your ESP (check settings)
  • Feedback loop registrations are active for major ISPs (FBL with Yahoo, JMRP with Microsoft, Postmaster Tools with Google)

See bounce handling best practices and email bounces explained.

Common configuration issues found in audits

From client audits, the most common issues:

IssueFrequencySeverity
DMARC at p=none (monitoring only)Very commonHigh
SPF too many DNS lookupsCommonHigh
Missing PTR / FCrDNS mismatchCommonHigh
DKIM key on wrong selectorCommonHigh
TLS certificate expiredOccasionalHigh
MTA-STS not deployedVery commonMedium
Bounce processing disabledOccasionalHigh
Authenticated submission on port 25 (should be 587)OccasionalMedium
Multiple SPF records (RFC violation)CommonHigh
DMARC missing rua= for aggregate reportsVery commonMedium

Practitioner note: The fastest sender-side wins I find in configuration audits are: rotating DMARC from p=none to p=quarantine after 30 days of monitoring (improves Gmail reputation), deploying MTA-STS (gives ISPs confidence in your TLS), and adding the rua= reporting endpoint (so you can see who is sending as you). Each takes under an hour to implement and DNS-level.

A complete check workflow

DNS layer (10 min):
- dig MX, SPF, DKIM, DMARC, PTR
- MXToolbox SuperTool overall check

SMTP layer (15 min):
- nc port reachability test
- openssl s_client TLS test
- swaks full SMTP transaction test

Authentication layer (5 min):
- Mail-Tester end-to-end check

Delivery layer (15 min):
- Send to 5-7 seed accounts across ISPs
- Verify inbox placement and Authentication-Results

Blocklist layer (5 min):
- MXToolbox blacklist check
- HetrixTools status review

Bounce handling (10 min):
- Confirm ESP bounce settings
- Verify FBL/JMRP/Postmaster Tools active

Total: 60-90 minutes for a thorough configuration audit.

For broader context see email deliverability guide, deliverability audit DIY checklist, and email authentication guide.

If you need help running a full mail server configuration audit or fixing the issues found, book a consultation. I do configuration audits weekly for senders dealing with deliverability problems.

Sources


v1.0 · May 2026

Frequently Asked Questions

How do I test my mail server?

Run four layers of checks: DNS-side (SPF, DKIM, DMARC, MX, PTR via MXToolbox), SMTP-side (port 25/587 reachability, TLS via swaks), end-to-end (Mail-Tester for content + auth scoring), and blocklist status (HetrixTools, Spamhaus). Each catches different failure modes.

How do I check if my SMTP server is working?

Use swaks to send a test message: 'swaks --to [email protected] --from [email protected] --server mail.yourdomain.com:587 --tls --auth-user user --auth-password pass'. Returns full SMTP transcript showing each command/response and identifying failures (auth, TLS, RCPT TO).

What is a mail server health check?

A series of tests verifying that your mail server is correctly configured for deliverability: DNS records (SPF, DKIM, DMARC, PTR), port accessibility, TLS, authentication, blocklist status, and bounce handling. Catches both broken configurations and reputation issues.

How often should I test email server configuration?

After any infrastructure change (new MTA, DNS update, IP migration). Monthly for active sending. Continuous monitoring via HetrixTools or Mailhardener catches regressions automatically. Pre-launch testing on any new sending domain or IP.

Can I test mail server authentication for free?

Yes. MXToolbox SuperTool checks SPF, DKIM, DMARC for free. Mail-Tester validates authentication end-to-end with a free single check. Mailhardener offers free authentication monitoring. swaks (free, open-source) tests SMTP-level interaction including TLS and AUTH.

Want this handled for you?

Free 30-minute strategy call. Walk away with a plan either way.