Spoofed emails may bypass DMARC authentication, even with IPv6, due to a combination of factors. These include misconfigured SPF records, especially regarding IPv6 addresses; failures in SPF lookups over IPv6 by some resolvers; issues with email forwarding services not properly handling authentication, often lacking header rewriting or Sender Rewriting Scheme (SRS); and alignment failures between SPF/DKIM domains and the From: header. Invalid DKIM signatures due to key rotation or tampering also contribute. The interaction and correct implementation of SPF, DKIM, and DMARC is crucial, and the Authentication-Results header can provide diagnostic information. Properly configured DMARC records and tools like MXToolbox can aid in validation and troubleshooting.
11 marketer opinions
Spoofed emails can pass DMARC authentication despite using IPv6 due to a combination of factors, including misconfigured SPF records (especially with IPv6 addresses), issues with email forwarding services not properly handling authentication, and alignment failures between SPF/DKIM domains and the From: header. Additionally, some resolvers may not handle IPv6 SPF lookups correctly. Examining the Authentication-Results header can help diagnose the specific reason for DMARC's pass or fail status.
Marketer view
Email marketer from StackOverflow explains that you can use the Authentication-Results header to see why DMARC passed and view the results of the SPF and DKIM tests performed by the email receiver. This will show you the IPv6 that was checked against.
9 Jan 2023 - StackOverflow
Marketer view
Email marketer from Mailhardener Blog explains that SPF has some issues with IPv6. Most resolvers do not retry SPF lookups over IPv4 if the IPv6 lookup fails, potentially leading to SPF failures and impacting DMARC.
28 Feb 2023 - Mailhardener Blog
3 expert opinions
Spoofed emails sometimes pass DMARC authentication due to a multitude of authentication and configuration failures. SPF records are often misconfigured, with missing IP addresses (particularly IPv6 addresses) of sending servers, or general DNS misconfigurations. DKIM signatures can be invalidated by key rotation issues or tampering, and forwarding practices can also circumvent DMARC. Correct implementation and interplay of SPF, DKIM, and DMARC are crucial to prevent spoofed emails from being authenticated.
Expert view
Expert from Spam Resource explains that DMARC failures can occur when SPF fails due to misconfigured DNS records, or when DKIM signatures are invalid due to key rotation issues or tampering during transit. Forwarding is also a common cause.
9 Nov 2021 - Spam Resource
Expert view
Expert from Word to the Wise explains that SPF failures happen if the IP address of the server sending the mail isn't listed in the SPF record, or if the SPF record is misconfigured. With IPv6, this could be because the IPv6 address isn't included or the DNS lookup fails.
16 Sep 2023 - Word to the Wise
4 technical articles
DMARC leverages SPF and DKIM to authenticate email senders. SPF verifies the sender's authorization, while DKIM ensures email integrity and sender verification. If SPF fails to authenticate the sender, DMARC relies on its policy ('p=' tag) to instruct receivers on handling the email (quarantine, reject, or none). For DKIM, the signature must be valid and aligned with the domain in the From: header for DMARC to pass. Spoofing involves disguising the email's origin for malicious purposes like phishing. DMARC policies guide mail receivers on managing emails that fail these authentication checks.
Technical article
Documentation from DMARC.org specifies that DMARC policies are designed to instruct mail receivers on how to handle emails that fail authentication checks. Receivers should follow the specified policy (none, quarantine, or reject) based on the DMARC record published by the sending domain.
18 Apr 2022 - DMARC.org
Technical article
Documentation from RFC Editor explains how DMARC uses DKIM to verify the integrity of the email content and sender. The DKIM signature must be valid and align with the domain in the From: header for DMARC to pass based on DKIM.
15 Mar 2024 - RFC Editor
Are there GDPR concerns related to IP addresses in DMARC reporting?
How can a phishing email pass SPF and DKIM authentication checks?
How can I prevent brand and sender profile impersonation in emails and what actions can I take?
How can I resolve DMARC verification failures when using a subdomain for email sending?
How can I use DMARC to prevent spammers from using my domain?
How do I handle spoofing when DMARC reject is set but not enforced on inbound mail server?