When setting up a new email sending service, one of the first steps is usually to update your domain's DNS records. For years, the conventional wisdom has been to add every service you use to your Sender Policy Framework (SPF) record. It seems logical; you're authorizing this service to send on your behalf, so you should list it. However, when it comes to MailChimp, this common practice is not only unnecessary but can be actively harmful to your email deliverability.
This might sound counterintuitive, especially since many guides online still recommend it. The reason you shouldn't add MailChimp to your SPF record lies in the technical details of how email authentication works, specifically the difference between the 'From' address your recipients see and the hidden 'envelope' address used by mail servers. Understanding this distinction is key to a clean, effective, and future-proof email authentication setup.
A Sender Policy Framework (SPF) record is a list of IP addresses and servers authorized to send email on behalf of your domain. When an email is received, the recipient's mail server checks the SPF record of the sending domain to verify the sender's authenticity. It's a fundamental part of preventing email spoofing and protecting your domain's reputation. The goal is to tell the world, "These are the only servers I trust to send my mail."
Here's where it gets a little technical, but it's the most important concept to grasp. Every email has two 'From' addresses. The first is the one you see in your inbox, often called the 'header From' or `RFC5322.From`. This is your branding, like newsletter@yourbrand.com. The second is a hidden address called the 'envelope sender', 'return-path', or `RFC5321.MailFrom`. This address is used by mail servers for the actual transport of the email and, crucially, for handling bounces.
The critical point is that SPF validation is performed on the domain found in the hidden `RFC5321.MailFrom` address, not the visible header `From` address. This is a common point of confusion that leads to misconfigured records. A receiving server looks at the envelope, not the letterhead, to decide which domain's SPF policy to check. So if a brand's domain isn't used in the MailFrom, adding it to your SPF policy is pointless.
MailChimp, by design, uses its own domain in the `RFC5321.MailFrom` address, typically something like `mcsv.net`. This allows them to process bounces and unsubscribes on their own servers efficiently. Since the SPF check looks at the `mcsv.net` domain, the receiving server will fetch and evaluate MailChimp's SPF policy, not the SPF policy on your domain. Your record is never even consulted for the SPF check.
If SPF isn't being checked against your domain, how does MailChimp prove an email is legitimately from you? The answer is DKIM (DomainKeys Identified Mail). DKIM works by adding a unique digital signature to the email's headers. This signature is created using a private key that only MailChimp has for your account, and it can be verified by anyone using a public key that you publish in your DNS.
When you authenticate your domain in MailChimp, you are given a DKIM record to add to your DNS. This record links your sending domain to the email, even though the `MailFrom` address belongs to MailChimp. For DMARC, a security policy that uses SPF and DKIM, this DKIM signature is sufficient for the email to 'align' with your domain and pass authentication. This is why you should always authenticate your domain with DKIM and SPF records.
So, while the SPF check will technically fail to align with your `From` domain, the DKIM check will pass and align perfectly. Because DMARC only requires one of these methods to pass and align, your email is considered authentic, and your deliverability is protected. This is the modern, standard way for email service providers to handle authentication.
SPF alignment
DKIM alignment
At this point, you might think, "Okay, it's not needed, but what's the harm in adding it anyway?" The harm comes from a critical limitation in the SPF specification: the 10 DNS lookup limit. To prevent denial-of-service attacks, a receiving mail server is only allowed to make a maximum of 10 DNS lookups when evaluating an SPF record. This includes any lookups from `include` mechanisms.
Every time you add an `include:thirdparty.com` to your SPF record, you are using up one of these 10 precious lookups. When you add MailChimp's include, `include:servers.mcsv.net`, you are consuming a lookup for absolutely no benefit, as your record isn't being checked for MailChimp sends in the first place.
As your organization grows, you will inevitably add more services that genuinely require an SPF entry, such as Google Workspace, Microsoft 365, or your CRM. Wasting a lookup on MailChimp brings you one step closer to exceeding the limit. If you go over 10 lookups, your SPF record will fail validation with what's called a 'PermError'. This is worse than having no SPF record at all, as it can cause all your legitimate emails from every service to fail authentication.
Danger of exceeding the SPF lookup limit
By keeping your SPF record clean and only including services that need to be there, you maintain its integrity and avoid future deliverability problems. The correct approach is to focus your efforts on setting up DKIM for services like MailChimp and reserving your valuable SPF `include` slots for services that use your domain in the `MailFrom` path.
In conclusion, the advice to add MailChimp to your SPF record is outdated and based on a misunderstanding of how SPF works. MailChimp relies on DKIM for domain alignment, making the SPF entry for them redundant. Including it does nothing to help your deliverability, wastes a valuable DNS lookup, and brings you closer to the hard limit that can break your email authentication entirely.
Your time is better spent ensuring you have correctly set up the DKIM records provided by MailChimp and monitoring your DMARC reports to ensure everything is working as intended. This keeps your DNS configuration simple, efficient, and secure, which is the ultimate goal of good email deliverability management.
Should I add MailChimp to my SPF record?
How does MailChimp authenticate my emails without SPF alignment?
What is the SPF 10 DNS lookup limit?
Does this apply to other email services besides MailChimp?
Matthew Whittaker
11 Jul 2025
Curious about what SPF means in the context of email? The full form is Sender Policy Framework, a crucial email authentication standard that helps prevent spoofing and phishing. Learn how this framework allows you to publicly declare which mail servers are authorized to send emails for your domain, protecting your brand reputation and improving your email deliverability.
Michael Ko
11 Jul 2025
Discover a little-known Microsoft 365 behavior that could be causing your emails to fail. We dive into the 500ms DNS timeout for SPF lookups, explaining why it happens, how it leads to intermittent delivery errors, and what you can do to create a robust SPF record that works every time.
Matthew Whittaker
11 Jul 2025
Struggling with SPF alignment for your Google Workspace alias domains? This guide explains why it happens, why it's usually okay, and how to ensure DMARC compliance and protect your email deliverability by focusing on DKIM alignment.
Michael Ko
13 Jul 2025
Struggling with the 'SPF unauthorized mail is prohibited' error? This message means the recipient's mail server couldn't verify you as a legitimate sender. This guide will walk you through what SPF is, how to diagnose the issue by identifying all your sending services, and provide step-by-step instructions on how to build and publish a correct SPF record in your DNS to fix the problem and improve your email deliverability.
Matthew Whittaker
14 Jul 2025
Ever seen an 'SPF TempError' in your DMARC reports and wondered what it means? This article demystifies this common, yet confusing, result. We'll explain what a TempError is, how it differs from a PermError, its impact on DMARC evaluation, and what actions, if any, you should take when you see them.