Suped

Why you shouldn't add MailChimp to your SPF record

Michael Ko profile picture

Michael Ko

11 Jul 2025

A minimalist illustration of an SPF record with the MailChimp entry crossed out, symbolizing it should not be included.

When setting up a new email sending service, one of the first steps is usually to update your domain's DNS records. For years, the conventional wisdom has been to add every service you use to your Sender Policy Framework (SPF) record. It seems logical; you're authorizing this service to send on your behalf, so you should list it. However, when it comes to MailChimp, this common practice is not only unnecessary but can be actively harmful to your email deliverability.

This might sound counterintuitive, especially since many guides online still recommend it. The reason you shouldn't add MailChimp to your SPF record lies in the technical details of how email authentication works, specifically the difference between the 'From' address your recipients see and the hidden 'envelope' address used by mail servers. Understanding this distinction is key to a clean, effective, and future-proof email authentication setup.

A minimalist illustration of two different email envelopes, one with a user's domain and one with a third-party service's domain, representing the two 'from' addresses. The style of the images should be A minimalist retro illustration in the style of Malika Favre. Dominant colors are bright poppy red and deep royal blue. Vector art, high contrast. Do not put any words in the image or alphanumeric characters.

SPF and the two 'from' addresses

A Sender Policy Framework (SPF) record is a list of IP addresses and servers authorized to send email on behalf of your domain. When an email is received, the recipient's mail server checks the SPF record of the sending domain to verify the sender's authenticity. It's a fundamental part of preventing email spoofing and protecting your domain's reputation. The goal is to tell the world, "These are the only servers I trust to send my mail."

Here's where it gets a little technical, but it's the most important concept to grasp. Every email has two 'From' addresses. The first is the one you see in your inbox, often called the 'header From' or `RFC5322.From`. This is your branding, like newsletter@yourbrand.com. The second is a hidden address called the 'envelope sender', 'return-path', or `RFC5321.MailFrom`. This address is used by mail servers for the actual transport of the email and, crucially, for handling bounces.

The critical point is that SPF validation is performed on the domain found in the hidden `RFC5321.MailFrom` address, not the visible header `From` address. This is a common point of confusion that leads to misconfigured records. A receiving server looks at the envelope, not the letterhead, to decide which domain's SPF policy to check. So if a brand's domain isn't used in the MailFrom, adding it to your SPF policy is pointless.

MailChimp, by design, uses its own domain in the `RFC5321.MailFrom` address, typically something like `mcsv.net`. This allows them to process bounces and unsubscribes on their own servers efficiently. Since the SPF check looks at the `mcsv.net` domain, the receiving server will fetch and evaluate MailChimp's SPF policy, not the SPF policy on your domain. Your record is never even consulted for the SPF check.

How MailChimp actually handles authentication

If SPF isn't being checked against your domain, how does MailChimp prove an email is legitimately from you? The answer is DKIM (DomainKeys Identified Mail). DKIM works by adding a unique digital signature to the email's headers. This signature is created using a private key that only MailChimp has for your account, and it can be verified by anyone using a public key that you publish in your DNS.

When you authenticate your domain in MailChimp, you are given a DKIM record to add to your DNS. This record links your sending domain to the email, even though the `MailFrom` address belongs to MailChimp. For DMARC, a security policy that uses SPF and DKIM, this DKIM signature is sufficient for the email to 'align' with your domain and pass authentication. This is why you should always authenticate your domain with DKIM and SPF records.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

So, while the SPF check will technically fail to align with your `From` domain, the DKIM check will pass and align perfectly. Because DMARC only requires one of these methods to pass and align, your email is considered authentic, and your deliverability is protected. This is the modern, standard way for email service providers to handle authentication.

Fails

SPF alignment

This will fail. The `RFC5321.MailFrom` uses a MailChimp domain (`mcsv.net`), while the `RFC5322.From` uses your domain. Because the domains don't match, SPF alignment fails for DMARC, even if MailChimp's own SPF record is valid.

Passes

DKIM alignment

This will pass. MailChimp signs the email using a DKIM key associated with your domain (`d=yourbrand.com`). This signature aligns with the `RFC5322.From` address domain, so the DMARC check passes. This is the intended authentication method.

The hidden costs of adding MailChimp to SPF

At this point, you might think, "Okay, it's not needed, but what's the harm in adding it anyway?" The harm comes from a critical limitation in the SPF specification: the 10 DNS lookup limit. To prevent denial-of-service attacks, a receiving mail server is only allowed to make a maximum of 10 DNS lookups when evaluating an SPF record. This includes any lookups from `include` mechanisms.

Every time you add an `include:thirdparty.com` to your SPF record, you are using up one of these 10 precious lookups. When you add MailChimp's include, `include:servers.mcsv.net`, you are consuming a lookup for absolutely no benefit, as your record isn't being checked for MailChimp sends in the first place.

An illustration of a DNS record chain with a big red X over the 11th link, showing the break at the 10 DNS lookup limit. The style of the images should be A minimalist retro illustration in the style of Malika Favre. Dominant colors are bright poppy red and deep royal blue. Vector art, high contrast. Do not put any words in the image or alphanumeric characters.

As your organization grows, you will inevitably add more services that genuinely require an SPF entry, such as Google Workspace, Microsoft 365, or your CRM. Wasting a lookup on MailChimp brings you one step closer to exceeding the limit. If you go over 10 lookups, your SPF record will fail validation with what's called a 'PermError'. This is worse than having no SPF record at all, as it can cause all your legitimate emails from every service to fail authentication.

SPF PermError warning

Danger of exceeding the SPF lookup limit

Exceeding the 10 DNS lookup limit will cause your entire SPF record to return a PermError. This invalidates your SPF for all sending services, not just the last one, and can cause legitimate mail to be marked as spam or rejected. Always keep your lookup count as low as possible.

By keeping your SPF record clean and only including services that need to be there, you maintain its integrity and avoid future deliverability problems. The correct approach is to focus your efforts on setting up DKIM for services like MailChimp and reserving your valuable SPF `include` slots for services that use your domain in the `MailFrom` path.

In conclusion, the advice to add MailChimp to your SPF record is outdated and based on a misunderstanding of how SPF works. MailChimp relies on DKIM for domain alignment, making the SPF entry for them redundant. Including it does nothing to help your deliverability, wastes a valuable DNS lookup, and brings you closer to the hard limit that can break your email authentication entirely.

Your time is better spent ensuring you have correctly set up the DKIM records provided by MailChimp and monitoring your DMARC reports to ensure everything is working as intended. This keeps your DNS configuration simple, efficient, and secure, which is the ultimate goal of good email deliverability management.

Frequently asked questions

Should I add MailChimp to my SPF record?

No. You should not add MailChimp's `include:servers.mcsv.net` to your SPF record. MailChimp sends emails using its own domain in the `RFC5321.MailFrom` address, so recipient servers check MailChimp's SPF record, not yours. Adding it only increases your DNS lookups.

How does MailChimp authenticate my emails without SPF alignment?

MailChimp uses DKIM (DomainKeys Identified Mail) to authenticate emails as coming from your domain. When you set up domain authentication in MailChimp, you add a DKIM record to your DNS. This creates a digital signature that aligns with your `From` address, which is what DMARC checks for.

What is the SPF 10 DNS lookup limit?

The SPF specification allows a maximum of 10 DNS lookups per check to prevent abuse. If your record requires more than 10 lookups (including `include` statements), it results in a PermError. This validation failure can cause legitimate emails to be rejected or sent to spam.

Does this apply to other email services besides MailChimp?

Yes, this principle applies to any email service provider (ESP) that uses its own domain in the `MailFrom`/Return-Path address. Many transactional email services like Postmark and, by default, SendGrid operate this way. Always check if a service uses your domain in the `MailFrom` before adding them to your SPF record.
A minimalist illustration of a shield, representing the protection of the Sender Policy Framework.

What is the full form of SPF in email?

Matthew Whittaker profile picture

Matthew Whittaker

11 Jul 2025

Curious about what SPF means in the context of email? The full form is Sender Policy Framework, a crucial email authentication standard that helps prevent spoofing and phishing. Learn how this framework allows you to publicly declare which mail servers are authorized to send emails for your domain, protecting your brand reputation and improving your email deliverability.

Illustration of a server representing Microsoft 365 with a clock on it, symbolizing the SPF DNS query timeout.

Why your emails fail at Microsoft: the hidden SPF DNS timeout

Michael Ko profile picture

Michael Ko

11 Jul 2025

Discover a little-known Microsoft 365 behavior that could be causing your emails to fail. We dive into the 500ms DNS timeout for SPF lookups, explaining why it happens, how it leads to intermittent delivery errors, and what you can do to create a robust SPF record that works every time.

A magnifying glass examining a puzzle piece with an email icon on it, representing the solution to an email authentication problem.

Solving the SPF alignment puzzle for google workspace alias domains

Matthew Whittaker profile picture

Matthew Whittaker

11 Jul 2025

Struggling with SPF alignment for your Google Workspace alias domains? This guide explains why it happens, why it's usually okay, and how to ensure DMARC compliance and protect your email deliverability by focusing on DKIM alignment.

A minimalist illustration of an email being blocked by a security shield, representing an SPF failure.

How to fix the 'SPF unauthorized mail is prohibited' error

Michael Ko profile picture

Michael Ko

13 Jul 2025

Struggling with the 'SPF unauthorized mail is prohibited' error? This message means the recipient's mail server couldn't verify you as a legitimate sender. This guide will walk you through what SPF is, how to diagnose the issue by identifying all your sending services, and provide step-by-step instructions on how to build and publish a correct SPF record in your DNS to fix the problem and improve your email deliverability.

An illustration of a DMARC report with a magnifying glass focused on an SPF TempError icon.

Demystifying the SPF TempError in your DMARC reports

Matthew Whittaker profile picture

Matthew Whittaker

14 Jul 2025

Ever seen an 'SPF TempError' in your DMARC reports and wondered what it means? This article demystifies this common, yet confusing, result. We'll explain what a TempError is, how it differs from a PermError, its impact on DMARC evaluation, and what actions, if any, you should take when you see them.

Start improving your email deliverability today

Get started