Suped

What is the ARC-Authentication-Results header used for?

Matthew Whittaker profile picture
Matthew Whittaker
Co-founder & CTO, Suped
Published 24 Feb 2025
Updated 12 Oct 2025
7 min read
An illustration showing an email passing through multiple servers, each adding an ARC seal to maintain authentication.
The ARC-Authentication-Results header plays a crucial role in modern email authentication, especially when messages are forwarded or pass through mailing lists. Without it, legitimate emails could easily fail checks like DMARC and be sent to spam. It provides a mechanism to preserve the original authentication results, allowing recipient mail servers to make informed decisions about an email's legitimacy, even after alterations have been made during transit.
This header is one of the three main components of the Authenticated Received Chain (ARC) protocol, alongside ARC-Seal and ARC-Message-Signature. These work in concert to create a verifiable chain of custody for an email, assuring that any changes made en route are transparently recorded and authenticated. Essentially, it allows intermediate mail handlers, like forwarding services, to sign their modifications to an email without invalidating the sender's original authentication, preventing legitimate emails from being incorrectly flagged as spam or phishing attempts.
Understanding this header is crucial for anyone managing email deliverability or implementing robust security measures. By properly interpreting its contents, you can diagnose issues with forwarded emails, ensure your legitimate messages reach the inbox, and maintain a strong sender reputation.

Understanding the email authentication chain

Purpose of ARC-Authentication-Results header

The primary purpose of the ARC-Authentication-Results header is to capture and transmit the authentication results of an email at each hop in its journey. When an email server receives a message, it performs standard authentication checks like SPF, DKIM, and DMARC. These results are then recorded in a standard Authentication-Results header. However, if the email is then forwarded or processed by a mailing list, the original authentication can break. For example, a forwarding server might change the "From" address or the message body, causing subsequent SPF or DKIM checks to fail.
This is where ARC steps in. Instead of just passing on the potentially failed authentication, ARC captures the Authentication-Results header from the previous hop and includes it within the ARC chain. This allows the final recipient server to see the original, legitimate authentication status of the email before any forwarding or list processing occurred. This historical record is essential for distinguishing between legitimate forwarded mail and malicious spoofed emails. Without ARC, many legitimate emails from mailing lists or forwarded accounts would unfairly end up in spam folders due to authentication failures after modifications in transit.

How ARC resolves forwarding issues

The ARC-Authentication-Results header is fundamental for preventing false negatives in email authentication. It acts as a trusted intermediary, allowing the recipient server to trust the authentication results from a previous hop, even if the current hop's direct authentication fails. This mechanism is critical for maintaining email deliverability for forwarded mail and mailing list subscribers.
  1. Original Authentication: The initial receiving server authenticates the email (SPF, DKIM, DMARC) and generates an Authentication-Results header.
  2. ARC Sealer Processing: A forwarding service or mailing list (an ARC Sealer) processes the email. It takes the previous Authentication-Results header and embeds it into the ARC-Authentication-Results header. It also creates a new ARC-Message-Signature header and an ARC-Seal header, adding its own signature.
  3. Recipient Server Validation: The final recipient server checks the ARC chain. If the current authentication fails but the ARC chain is valid and shows original authentication passed, the email is more likely to be delivered to the inbox.

Anatomy of the header

Components of the ARC-Authentication-Results header

The ARC-Authentication-Results header is essentially a snapshot of the standard Authentication-Results header at a specific point in the email's journey. It contains various tags that provide details about the authentication checks performed by the previous ARC-Sealer.
Example ARC-Authentication-Results headerplain
ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@example.com header.s=s1 header.b=AbCdEfGh; spf=pass (google.com: domain of user@example.com designates 203.0.113.42 as permitted sender) smtp.mailfrom=user@example.com; dmarc=pass (p=quarantine sp=quarantine dis=none) header.from=example.com
Key elements you will typically find within this header include:
  1. Chain Index (i): Indicates the position of this ARC entry in the authentication chain. It increments with each ARC-Sealer.
  2. Authentication Domain: The domain that performed the authentication checks, such as mx.google.com.
  3. DKIM Results: Shows whether the DKIM check passed or failed, along with details like the signing domain (header.i) and selector (header.s). You can find more details about DKIM issues on our knowledge base.
  4. SPF Results: Details the SPF check, including the sender domain and IP address that was validated.
  5. DMARC Results: Indicates the DMARC policy applied (p=), subdomain policy (sp=), and any disposition (dis=).
  6. ARC Status (arc=): This field, often arc=none or arc=pass, confirms the validation status of the ARC chain itself. You can learn more about the arc-status field here.
Each ARC-Authentication-Results header essentially acts as a signed receipt from a previous mail server, vouching for the email's authenticity at that point in time.

Impact on email deliverability

How receiving servers use this header

An email server analyzing ARC seals to determine the legitimacy of a forwarded email.
When a recipient mail server receives an email, it first performs its own email authentication checks. If these checks, particularly SPF and DKIM, fail due to forwarding or list processing, the server then looks for ARC headers. It reconstructs the ARC chain using the ARC-Seal, ARC-Message-Signature, and ARC-Authentication-Results headers. The final server validates the chain by verifying the cryptographic signatures in each ARC-Seal, ensuring that the chain hasn't been tampered with and that each sealer is trusted.
If the ARC chain is valid, the recipient server can then inspect the ARC-Authentication-Results header from the most recent trusted ARC-Sealer to see the original authentication status. This allows the DMARC policy of the sender to be respected, even if direct authentication fails. For instance, Microsoft Defender and other major mail providers utilize ARC to enhance their spam filtering and ensure legitimate forwarded emails are delivered. Without ARC, legitimate messages, particularly those sent through mailing lists that modify the message, would often fail DMARC and be blocked or sent to spam.

Without ARC

  1. DMARC Failure: Forwarded emails often fail DMARC verification because their SPF or DKIM alignment is broken by intermediate servers.
  2. Poor Deliverability: Legitimate messages from mailing lists or forwarded accounts are frequently marked as spam or rejected.
  3. Sender Reputation Damage: Sender domains might suffer from reduced trust due to high volumes of DMARC failures, impacting all their email campaigns. We have a practical guide to understanding domain reputation.

With ARC

  1. Preserved Authentication: The ARC chain provides a verifiable history of authentication results, even if the email has been modified by trusted intermediaries.
  2. Improved Deliverability: Legitimate emails are more likely to reach the inbox, reducing false positives in spam filtering.
  3. Enhanced Trust: Recipient servers can trust the chain of custody, ensuring that emails that were originally authenticated remain trusted.

Ensuring smooth email flow

Monitoring ARC with Suped

Implementing and monitoring ARC (Authenticated Received Chain) is a critical step for organizations sending emails through complex routing, like those using forwarding services or large mailing lists. Suped provides comprehensive DMARC monitoring that includes insights into ARC. Our platform helps you visualize the authentication status of your emails, including those where ARC plays a role in preserving deliverability.
With Suped, you can analyze your DMARC reports to understand how ARC is impacting your email flow. We highlight when ARC is successfully preserving authentication for emails that might otherwise fail. Our platform offers AI-powered recommendations to address any authentication issues, ensuring your legitimate emails consistently reach their intended recipients. Furthermore, our unified platform brings together all aspects of email security, making it simple to manage DMARC, SPF, DKIM, and deliverability from a single dashboard.
Whether you are an SMB or an MSP managing multiple client domains, Suped simplifies the complexities of email authentication. Our generous free plan provides access to essential DMARC monitoring tools, allowing you to quickly identify and fix issues. Our SPF flattening feature also ensures you stay within SPF lookup limits, further boosting your email deliverability. Don't let forwarded emails end up in spam. Use Suped to maintain trust and ensure your messages always reach the inbox.

Key takeaway

The ARC-Authentication-Results header is a vital component of the Authenticated Received Chain protocol, providing a transparent and verifiable history of an email's authentication status. It ensures that legitimate emails, even after being forwarded or processed by mailing lists, can still pass DMARC checks and reach their intended recipients. By understanding and utilizing ARC, organizations can significantly improve their email deliverability and protect their sender reputation from the pitfalls of intermediate mail handling. Monitoring your ARC data, especially through a platform like Suped, provides the insights needed to maintain robust email security and optimal inbox placement.

Frequently asked questions

DMARC monitoring

Start monitoring your DMARC reports today

Suped DMARC platform dashboard

What you'll get with Suped

Real-time DMARC report monitoring and analysis
Automated alerts for authentication failures
Clear recommendations to improve email deliverability
Protection against phishing and domain spoofing
    What is the ARC-Authentication-Results header used for? - ARC - Email authentication - Knowledge base - Suped