Generated by GPT-5-mini| MX record | |
|---|---|
| Name | Mail Exchange record |
| Type | DNS resource record |
| Introduced | 1980s |
| Defined in | RFC 974, RFC 1034, RFC 1035, RFC 5321 |
| Purpose | Directs email delivery to mail servers |
| Owner | Internet Assigned Numbers Authority |
MX record
An MX record is a specialized Domain Name System resource record that designates mail servers responsible for accepting email for a domain. It interfaces with standards bodies and operational systems such as Internet Assigned Numbers Authority, Internet Engineering Task Force, Domain Name System, Simple Mail Transfer Protocol, and implementations like Postfix, Exim, and Microsoft Exchange. Administrators coordinate MX records with hosting providers, registrars, and corporate directories including Google Workspace, Microsoft 365, and Amazon WorkMail.
MX records are stored in DNS zone files managed by vendors such as Cloudflare, Akamai, GoDaddy, and Amazon Route 53. They point clients to mail servers using domain names rather than IP addresses, enabling delegation to services like Mailchimp, SendGrid, and Proofpoint. Historical development involved proposals and standardization by organizations including Vint Cerf's work and the Internet Engineering Task Force working groups that produced RFCs shaping SMTP and DNS interactions. Large-scale infrastructures for email routing appear in networks run by Google, Microsoft, Yahoo!, and national research networks like CERN.
An MX record consists of a preference value and a domain name pointing to a mail exchanger. Format conventions derive from specifications in RFC documents authored and ratified by Paul Mockapetris and later editors within the IETF; implementations follow syntax seen in BIND, PowerDNS, and Unbound. The priority (preference) integer orders delivery attempts and is managed alongside records such as A record and AAAA record for IPv4 and IPv6 mapping. Administrators often coordinate priorities when using redundancy with services like Akamai, Fastly, and regional providers such as Linode or DigitalOcean.
When a sending MTA such as Exim or Sendmail needs to deliver mail, it performs MX lookup via resolvers provided by ISPs, public resolvers like Google Public DNS and Cloudflare DNS, or enterprise resolvers like Cisco appliances. The resolver queries authoritative name servers managed by registrars including Namecheap or infrastructure operated by Verisign. If multiple MX records exist, the sending host sorts them by priority and uses DNS responses that may include additional records such as CNAME record or glue records in delegations involving ICANN-managed zones. Path selection can be influenced by DNSSEC signatures developed by Paul Vixie era enhancements and validated against trust anchors maintained by organizations like IANA.
SMTP clients consult MX priorities to attempt connections to mail exchangers running SMT P servers on port 25; if unreachable, clients iterate through backups maintained by providers like Proofpoint or cloud mail relays from Amazon Web Services. Delivery retries follow policies codified in RFC 5321 with queuing behavior seen in systems like Postfix and Microsoft Exchange Server. Operational practices include traffic steering via geographically distributed endpoints in networks run by Google and Microsoft and load balancing using appliances from F5 Networks or software such as HAProxy.
Administrators configure MX records via control panels at registrars and DNS hosts like GoDaddy, Namecheap, Cloudflare, Amazon Route 53, and enterprise platforms managed by Red Hat or Canonical. Best practices include ensuring corresponding A record/AAAA record exist for target hostnames, verifying TTL values, and coordinating with administrators of mail gateways including Barracuda Networks and Mimecast. Change management often involves ticketing systems like ServiceNow and monitoring through services such as Nagios or Zabbix.
MX configurations intersect with security mechanisms such as Domain-based Message Authentication, Reporting and Conformance, SPF, DKIM, and DMARC developed and standardized by working groups of the IETF. Malicious actors exploit MX records in phishing campaigns leveraging platforms like Zimbra or misconfigured relays to facilitate spam observed in incidents involving botnets tracked by Spamhaus and CERT teams. Defenses include DNSSEC validation, use of reputation services from vendors like Cisco Talos and Trend Micro, and operational controls integrated with email security gateways from Proofpoint and Mimecast.
Different DNS server software—BIND, PowerDNS, Knot DNS, Microsoft DNS—and MTA implementations—Postfix, Exim, Sendmail, Microsoft Exchange Server—exhibit subtle behavior differences in handling MX lookups, fallback to A records, and processing of CNAME responses. Standards evolution is recorded in RFCs shepherded by IETF working groups and influenced by operational feedback from major providers including Google, Microsoft, Yahoo!, and national registries like AFNIC. Compatibility testing across platforms is often coordinated in interoperability events organized by bodies like IETF and industry consortia such as M3AAWG.