Suped

An advanced guide to email authentication - beyond the basics

Matthew Whittaker profile picture

Matthew Whittaker

11 Jul 2025

A shield with a checkmark icon, symbolizing email authentication security.

If you're in the email world, you've undoubtedly heard about SPF, DKIM, and DMARC. You've probably already set them up for your domain, following guides and best practices. But setting up the basic records is just the first step. True email authentication mastery goes much deeper, into a landscape of alignment issues, technical limitations, and strategic policy decisions that can make or break your email deliverability and security.

This guide is for those who have moved past the initial setup. We'll explore the nuances that separate a basic configuration from a robust one. We will dive into advanced topics like DMARC alignment, the infamous SPF 10-lookup limit, a safe path to a restrictive policy, and the emerging standards that build upon this foundation. It's time to go beyond the basics and truly secure your email sending reputation.

A minimalist retro illustration of a key fitting into a lock that has a checkmark on it, symbolizing successful email authentication. The style of the images should be A minimalist retro illustration in the style of Malika Favre. Dominant colors are bright poppy red and deep royal blue. Vector art, high contrast. Do not put any words in the image or alphanumeric characters.

The critical role of DMARC alignment

One of the most misunderstood concepts in DMARC is alignment. It’s not enough for an email to pass SPF or DKIM checks; for DMARC to pass, the domain used for those checks must align with the domain in the visible 'From' address. This is the mechanism that actually prevents spoofing. An email can have a valid SPF record and a valid DKIM signature, but if they are for a different domain than the one your recipients see, DMARC will fail.

For SPF alignment, the domain in the 'Return-Path' (also known as the 'envelope from' or 'MailFrom') address must match the 'From' header domain. This often breaks when using third-party services that handle bounces on their own domain. For DKIM, the domain specified in the signature's d= tag must match the 'From' header domain. This is generally easier to control, as you can often configure your sending services to sign with a key for your domain.

DMARC allows for two alignment modes: relaxed and strict. Relaxed alignment, the default, allows subdomains to align with the parent domain. For example, an email from marketing.example.com can pass DMARC for example.com. Strict alignment requires an exact domain match. Choosing the right mode depends on your organization's email infrastructure and security requirements.

Passes Authentication, Fails Alignment

Scenario

An email is sent from you@yourdomain.com, but through a third-party service.

Result

  • SPF passes using the service's domain (sendingservice.com). PASS
  • The SPF domain (sendingservice.com) does not match the 'From' domain (yourdomain.com). FAIL

Passes Authentication & Alignment

Scenario

The same email, but the service is configured to use your domain for DKIM signing.

Result

  • DKIM passes using a key associated with yourdomain.com. PASS
  • The DKIM domain (yourdomain.com) matches the 'From' domain (yourdomain.com). PASS

The Sender Policy Framework (SPF) has a well-known and often frustrating limitation: a maximum of 10 DNS lookups are allowed per check. Every time a receiving server evaluates your SPF record, it counts mechanisms like include, a, mx, and redirect against this limit. If your record exceeds 10 lookups, it will result in a permanent error (PermError), and SPF authentication will fail. This becomes a significant problem for businesses that use many cloud services, each requiring its own include.

One advanced technique to manage this is using SPF macros. Macros are variables that can be inserted into an SPF record, which are then replaced with values from the email being processed. For example, you could create a specific subdomain for a vendor and use macros to check the sending IP against a record for that vendor, potentially reducing the number of static include mechanisms in your main record.

Example of a dynamic SPF record

SPF Record with Macros

v=spf1 include:%{ir}._ip.%{v}._spf.example.com ~all

Understanding the example

This record uses the IP address of the sender (%{i}, reversed as %{ir}) and the domain name (%{v}) to construct a unique DNS query. This offloads the lookup logic to a different part of your DNS.

While powerful, macros add complexity. An alternative approach is 'SPF flattening', where you resolve all the IP addresses from your include mechanisms into a single record of ip4 and ip6 ranges. However, this creates a maintenance burden, as you must constantly monitor your vendors' sending IPs for changes and update your record accordingly. Failure to do so can cause legitimate emails to be blocked.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

From monitoring to enforcement with DMARC

A DMARC record is not a 'set it and forget it' tool. Its true power comes from the reports it generates. By setting your policy to p=none, you enter a monitoring-only mode. This is the crucial first phase. You must use a DMARC monitoring service to parse the aggregate (RUA) reports that mailbox providers send you. These reports give you a complete picture of who is sending email on behalf of your domain, and whether those emails are passing or failing authentication checks.

The goal is to move methodically from p=none to p=quarantine and ultimately to p=reject. Rushing this process is a common mistake that can lead to legitimate emails being sent to spam or blocked entirely. The DMARC policy escalation should only begin after you have identified and correctly configured all your legitimate sending sources to pass DMARC alignment.

  • Start with p=none. Collect and analyze RUA reports for several weeks to get a comprehensive view of your email ecosystem.
  • Identify all legitimate sources. Work to bring any non-compliant but legitimate senders into DMARC alignment through proper SPF and DKIM configuration.
  • Use the pct tag. When moving to p=quarantine or p=reject, start with a small percentage, like pct=5, to limit the impact of any mistakes.
  • Increase percentage gradually. As you gain confidence that no legitimate mail is being affected, slowly increase the pct value towards 100.
  • Aim for p=reject. This is the ultimate goal, providing the strongest protection against domain spoofing and phishing attacks.
A minimalist retro illustration showing a progress bar moving from left to right, with icons representing monitoring, quarantine, and reject stages. The style of the images should be A minimalist retro illustration in the style of Malika Favre. Dominant colors are bright poppy red and deep royal blue. Vector art, high contrast. Do not put any words in the image or alphanumeric characters.

The next frontier: BIMI and MTA-STS

Once you have achieved a DMARC enforcement policy, you can explore emerging standards that build upon it. Brand Indicators for Message Identification (BIMI) is a prime example. BIMI is an email specification that allows you to display your company's logo next to your authenticated emails in the recipient's inbox. It acts as a visual verification of your brand's identity and is a powerful way to increase brand recognition and trust.

Implementing BIMI isn't simple. It has strict prerequisites, the most important being a DMARC policy of p=quarantine or p=reject at 100%. You also need a specific SVG Tiny 1.2 format logo hosted publicly, and for many mail providers, a Verified Mark Certificate (VMC). A VMC is a digital certificate that proves your ownership of the trademarked logo. This effectively ties your marketing to your security posture, providing a clear incentive for strong DMARC enforcement.

Another important standard is MTA-STS (Mail Transfer Agent Strict Transport Security). While SPF, DKIM, and DMARC authenticate the sender, MTA-STS secures the connection itself. It ensures that when email is transmitted between mail servers, the connection is always encrypted with TLS. This prevents man-in-the-middle and downgrade attacks where an attacker could otherwise force a connection to be unencrypted and intercept the email's contents. It's another crucial layer in a defense-in-depth email security strategy.

Email authentication is a journey, not a destination. Moving beyond the initial setup of SPF, DKIM, and DMARC is essential for protecting your brand, ensuring deliverability, and building trust with your audience. By mastering alignment, navigating technical limitations, and strategically escalating your DMARC policy, you lay the groundwork for a truly secure email program.

The email landscape is constantly evolving, with new standards like BIMI and MTA-STS raising the bar. Treating email authentication as an ongoing discipline, rather than a one-time checklist item, is the key to staying ahead of threats and making sure your messages are seen and trusted.

Frequently asked questions

What's the difference between relaxed and strict DMARC alignment?

Relaxed alignment (the default) means that a subdomain can authenticate on behalf of a parent domain. For example, if the 'From' address is user@example.com, a DKIM signature from news.example.com would pass. Strict alignment requires an exact match between the 'From' domain and the domain in the SPF or DKIM check.

Can I use multiple SPF records on my domain?

No. A domain must have only one SPF record. Having multiple SPF records is a common configuration error that will cause SPF to fail with a PermError. All authorized sending IPs and services must be combined into a single SPF record in your DNS.

How long does it take to get to a p=reject DMARC policy?

The timeline varies greatly depending on the complexity of your email infrastructure. For a small business with one or two sending services, it might take a few weeks. For a large enterprise with dozens of third-party senders, it could take several months of careful monitoring and remediation before it's safe to move to a p=reject policy.

Is BIMI necessary for email deliverability?

BIMI is not currently a direct factor in email deliverability or inbox placement. It is a reward for having excellent email authentication already in place. Its primary benefit is brand visibility and trust, not a direct deliverability boost. However, the prerequisites for BIMI (like a p=reject DMARC policy) are themselves very beneficial for deliverability.
A minimalist illustration of an envelope sealed with a wax stamp that has a checkmark, symbolizing the security and authentication provided by DMARC.

The benefits of implementing DMARC

Matthew Whittaker profile picture

Matthew Whittaker

6 Jul 2025

Discover the essential benefits of implementing DMARC for your email. This article explains how DMARC enhances your security by preventing domain spoofing and phishing, boosts deliverability by improving your sender reputation, and provides invaluable visibility into your email ecosystem. Learn why DMARC is a non-negotiable tool for protecting your brand and ensuring your messages reach the inbox.

An illustration of a DMARC professional offering help to a client.

A practical guide to finding a DMARC professional

Michael Ko profile picture

Michael Ko

9 Jul 2025

Learn how to find, vet, and hire a DMARC professional to secure your email and improve deliverability. This guide covers what to look for in an expert, where to find them, and the key questions to ask to ensure you're protecting your brand from phishing and spoofing.

DMARC verification failed illustration

Why your emails are getting a 'DMARC verification failed' error

Michael Ko profile picture

Michael Ko

10 Jul 2025

Getting a 'DMARC verification failed' error? This post breaks down what it means, the common causes like alignment issues with SPF and DKIM, and how to fix it. Learn how to diagnose problems using DMARC reports and a step-by-step approach to secure your domain without blocking legitimate emails.

A settings gear icon on the left transitions into a shield icon on the right, representing the process of fixing a DMARC setting.

How to fix 'DMARC policy not enabled' warnings

Matthew Whittaker profile picture

Matthew Whittaker

11 Jul 2025

Seeing a 'DMARC policy not enabled' warning can be confusing. This message doesn't mean something is broken, but rather that your DMARC policy is set to a monitoring-only mode (p=none) and not yet enforcing protection. This guide explains what the warning means, why starting with p=none is a critical first step, and how to methodically analyze your email sources to safely transition to an enforcement policy like p=quarantine or p=reject, ultimately securing your domain and improving deliverability.

A minimalist illustration showing a shield protecting an envelope, symbolizing DMARC email security.

Simple DMARC examples: how to start with a p=none policy

Michael Ko profile picture

Michael Ko

11 Jul 2025

Getting started with DMARC doesn't have to be complicated. This guide explains why a `p=none` policy is the safest first step, providing simple, copy-paste examples to help you start monitoring your email domain. Learn how to gain crucial visibility into who is sending email on your behalf without any risk to your deliverability.

Three shields representing SPF, DKIM, and DMARC.

A simple guide to DMARC, SPF, and DKIM

Matthew Whittaker profile picture

Matthew Whittaker

11 Jul 2025

Ever felt lost in the alphabet soup of email security? This guide breaks down DMARC, SPF, and DKIM into simple concepts. We'll explain how SPF creates a guest list for your emails, DKIM adds a tamper-proof seal, and DMARC acts as the security chief, telling mail servers how to handle unverified messages, ensuring your emails are trusted and secure.

Start improving your email deliverability today

Get started