Suped

What is the 'd=' tag in an ARC-Seal header?

Michael Ko profile picture
Michael Ko
Co-founder & CEO, Suped
Published 20 Apr 2025
Updated 14 Oct 2025
7 min read
An email envelope with a 'd=' tag and chain links, symbolizing ARC-Seal
When an email travels through various intermediaries before reaching its final destination, like a mailing list or a forwarding service, its original authentication signatures (SPF and DKIM) can often break. The Authenticated Received Chain (ARC) was developed to address this issue by providing a way to preserve email authentication results across these forwarding hops.
The ARC-Seal header is a crucial component within this system, acting as a cryptographic seal that verifies the authenticity of the ARC chain. It's essentially a signature over the previous ARC-Message-Signature and Authentication-Results headers, ensuring that the message hasn't been tampered with since the last hop. Within the ARC-Seal header, various tags provide specific pieces of information, and the d= tag plays a vital role in identifying the signing entity.
Understanding what the d= tag signifies is essential for anyone dealing with email deliverability, especially when troubleshooting authentication failures. This tag indicates which domain is responsible for applying the ARC-Seal, allowing receiving mail servers to verify the integrity of the chain.

Role in verifying ARC signatures

The domain of the ARC sealer

The d= tag in an ARC-Seal header specifies the domain name of the entity that applied the ARC-Seal. This domain is crucial because it's used to locate the ARC public key in the DNS, which is necessary to verify the cryptographic signature of the ARC-Seal header. Think of it as the identity card for the server that processed the email at a specific point in its journey.
When a message is forwarded, the forwarding mail server becomes an ARC Sealer. This server will add new ARC headers, including an ARC-Seal, an ARC-Message-Signature, and an ARC-Authentication-Results header. The d= tag within the ARC-Seal will contain the domain of this forwarding server. This process creates a chain of trust, where each successive mail server can attest to the authenticity of the email at its point of reception.
Example ARC-Seal Header with 'd=' tag
ARC-Seal: i=1; a=rsa-sha256; t=1678886400; cv=none; d=example.com; s=selector1; bh=SomeBodyHashValue; b=SomeSignatureValue
The domain specified in the d= tag is then used by subsequent mail servers to perform a DNS lookup for the corresponding ARC public key. This key is stored in a TXT record, similar to how DKIM records are published. If the signature verifies successfully, it confirms that the ARC-Seal was indeed applied by the claimed domain and that the ARC-Message-Signature (and the message content it covers) remains intact.

Importance for email deliverability and trust

How 'd=' works with other ARC-Seal tags

The d= tag doesn't work in isolation. It collaborates with other tags within the ARC-Seal header to form a complete authentication picture. The s= (selector) tag, for instance, specifies the name of the selector used to retrieve the public key from the d= domain's DNS. Without both, a receiving server wouldn't know exactly where to look for the verification key. More information can be found on RFC 8617, the ARC specification.
  1. Signature tag: The s= tag works with d= to pinpoint the specific DNS record containing the public key needed to verify the ARC-Seal. You can learn more about the 's=' tag in an ARC-Seal header.
  2. Instance tag: The i= tag indicates the ARC instance number, showing its position in the forwarding chain. This helps organize multiple ARC sets within a single email. More details on the 'i=' tag in an ARC-Seal header are available.
  3. Chain validation status: The cv= tag denotes the chain validation status, indicating whether the previous ARC set validated successfully. This is crucial for establishing trust. You can learn more about the 'cv' tag in an ARC-Seal header.
Together, these tags ensure that each ARC-Seal can be properly attributed and verified, building a verifiable history of authentication results as the email traverses different mail systems. This layered approach helps receiving mail servers make informed decisions about an email's legitimacy, even if its original authentication breaks.

Monitoring and troubleshooting 'd=' tag issues

Configuring trusted ARC sealers

For organizations that forward email, such as mailing list providers or email security gateways, correctly configuring ARC as a trusted ARC sealer is paramount. This involves ensuring that the domain used in the d= tag matches the domain publishing the ARC public key in DNS. If these don't align, receiving mail servers will be unable to verify the ARC-Seal, potentially leading to deliverability issues.

Key configuration requirement

The domain name in the ARC-Seal's d= tag must exactly match the domain that's publishing the ARC public key. For Microsoft Defender, this ensures the proper validation of ARC-signed messages.
For organizations leveraging DMARC monitoring, ARC plays a supporting role. While DMARC directly evaluates SPF and DKIM alignment, ARC provides crucial context when these initial checks fail due to legitimate forwarding. By monitoring your ARC implementation, you can ensure that your legitimate emails are not being incorrectly flagged as spam when forwarded through services that correctly implement ARC.
To effectively manage and troubleshoot ARC, having a robust email security and deliverability platform is essential. Suped offers AI-powered recommendations that guide you through fixing issues and strengthening your email policies, including ARC. Our unified platform provides real-time alerts and brings together DMARC, SPF, and DKIM monitoring with blocklist and deliverability insights, ensuring comprehensive oversight of your email ecosystem.

Best practices for 'd=' tag management

A magnifying glass inspecting domains in an ARC chain, highlighting the 'd=' tag

Best practices for 'd=' tag management

Managing the d= tag correctly is a critical aspect of maintaining strong email authentication and deliverability. Misconfigurations can lead to legitimate emails being marked as suspicious, impacting sender reputation and inbox placement. Therefore, adhering to best practices is essential for any organization that sends or forwards email.

Common pitfalls

  1. Mismatched domains: The domain in d= does not correspond to the domain publishing the ARC public key.
  2. Incorrect DNS records: Errors in the ARC TXT record prevent proper key retrieval and validation.
  3. Lack of monitoring: Not actively checking ARC validation results can lead to undetected issues.

Recommended solutions

  1. Align domains: Ensure the d= tag always reflects the correct signing domain.
  2. Validate DNS: Regularly check your ARC DNS records for accuracy and proper syntax.
  3. Use a DMARC platform: Leverage tools like Suped for comprehensive monitoring and insights into ARC validation.
By actively monitoring your ARC implementation, particularly the validity of the d= tag and its corresponding DNS entries, you can significantly improve email deliverability and maintain a strong security posture. This proactive approach helps prevent legitimate emails from being incorrectly filtered or rejected by recipient mail servers.

Conclusion

Final thoughts on ARC and the 'd=' tag

The d= tag in an ARC-Seal header is a fundamental identifier, linking the cryptographic signature back to the domain that applied the seal. It's a critical piece of the puzzle that allows ARC to build a trusted chain of custody for emails, even as they traverse multiple intermediaries. Without this tag, the integrity of the ARC-Seal would be impossible to verify, undermining the entire purpose of ARC.
For organizations seeking to enhance their email security and ensure optimal deliverability, a thorough understanding and correct implementation of ARC, including the nuances of its various tags like d=, are indispensable. Tools like Suped provide the necessary visibility and actionable insights to manage these complex authentication protocols effectively, helping you protect your brand and ensure your messages reach the inbox.
By proactively addressing any ARC configuration issues and continuously monitoring your email authentication, you can build and maintain a strong sender reputation. This not only improves deliverability but also significantly reduces the risk of email spoofing and phishing attacks that rely on exploiting authentication weaknesses.

Frequently asked questions

DMARC monitoring

Start monitoring your DMARC reports today

Suped DMARC platform dashboard

What you'll get with Suped

Real-time DMARC report monitoring and analysis
Automated alerts for authentication failures
Clear recommendations to improve email deliverability
Protection against phishing and domain spoofing
    What is the 'd=' tag in an ARC-Seal header? - ARC - Email authentication - Knowledge base - Suped