An email handshake is the initial communication process between two mail servers when establishing a connection for email transmission. It makes sure that both servers agree on the protocol and capabilities before exchanging email data.
The email handshake is part of the Simple Mail Transfer Protocol (SMTP) session, which governs the sending of emails over the Internet. When a sending mail server connects to a receiving server, the handshake determines whether the connection can proceed, what features are supported, and how the email should be transmitted securely.
During this phase, the servers exchange commands and responses, starting with HELO or EHLO (Extended HELO) and often including details for authentication and encryption setup.
The process typically involves the following steps:
The handshake is crucial for ensuring compatibility, security, and trust between servers.
Email handshakes matter because they:
If the handshake fails, the email session ends, and the message is not delivered.
Email handshake processes are relevant for:
Example scenario: An organization’s SMTP server performs an email handshake with a recipient’s mail server using EHLO and STARTTLS, ensuring the message is encrypted before delivery.
The email cannot be sent, and the sending server typically receives a 4xx or 5xx error message indicating the failure reason.
No. Encryption through TLS is negotiated during the handshake, but if both servers support it, it is strongly recommended and often required by modern policies.
Yes. Authentication can occur during or immediately after the handshake, especially in authenticated SMTP sessions.
Verify all your emails, even Catch-alls in real-time with our Email Verification Software.
Create an account for free.