What SPF mechanism indicates that a domain should send no mail?
Matthew Whittaker
Co-founder & CTO, Suped
Published 23 Jul 2025
Updated 8 Nov 2025
7 min read
In the world of email security, SPF (Sender Policy Framework) is a critical authentication protocol. Its main job is to help receiving mail servers verify that incoming mail from a domain is sent by authorized hosts. This prevents spammers and phishers from sending messages that appear to come from your domain, a practice known as email spoofing.
While SPF is often thought of as a way to list authorized senders, it also plays a crucial role for domains that are not intended to send any email at all. These might be parked domains, domains used solely for web hosting, or subdomains that should never originate mail. For such cases, it is vital to explicitly declare that no email should ever come from them.
The correct SPF mechanism to indicate that a domain should send no mail is simple yet powerful. It acts as a clear signal to all mail servers on the internet, significantly bolstering your domain's security posture and protecting your brand's reputation against potential abuse. Let's delve into this specific mechanism and its importance.
The explicit denial: '-all'
The explicit denial: '-all'
The SPF mechanism that explicitly indicates a domain should send no mail is -all. This mechanism, placed at the end of an SPF record, tells receiving mail servers that if a sending IP address does not match any of the preceding SPF mechanisms, then the email should be hard failed. A hard fail means that the email should be rejected outright.
It's important to distinguish -all from ~all, which signifies a soft fail. While ~all suggests that the email may not be authorized but still allows it to be accepted (often marked as spam), -all is a definitive statement that no email should ever be sent from this domain. For domains that genuinely send no email, -all is the strongest and most appropriate policy to implement. You can find more details about ~all and its implications by reading our article on what a '~all' mechanism in SPF signifies.
When an SPF record ends with -all, it signals to all mail servers that any email claiming to be from your domain but not originating from an explicitly approved IP address should be discarded. This is a robust defense against direct domain spoofing, especially for domains that should never send mail. It acts as a clear 'no entry' sign for unauthorized senders.
Example SPF record for no mail sendingDNS
v=spf1 -all
Security implications and prevention of spoofing
Security implications and prevention of spoofing
Implementing v=spf1 -all is a critical security measure for domains that do not send email. Without it, such domains become prime targets for attackers looking to spoof email addresses. These spoofed emails can be used for phishing attacks, distributing malware, or simply sending spam, all of which damage your brand's reputation and potentially lead to your legitimate domains being blocklisted (or blacklisted).
By setting an explicit SPF policy for domains that do not send mail, you are actively preventing their misuse. This protects your customers, partners, and employees from receiving fraudulent emails that appear to originate from your organization. It's a proactive step in a comprehensive email security strategy.
Best practices for non-sending domains
Implement SPF: Ensure all non-sending domains have an SPF record with v=spf1 -all.
Monitor reports: Even for non-sending domains, DMARC reports can reveal attempts at spoofing.
Many organizations overlook these domains, inadvertently leaving a loophole for attackers. A properly configured SPF record closes this loophole, ensuring that any email claiming to be from these domains will be rejected by compliant mail servers. This strategy is also recommended by industry leaders, such as Cloudflare's guide on protecting domains without email
Crafting the 'no mail' SPF record
Crafting the 'no mail' SPF record
Creating an SPF record for a domain that should send no mail is straightforward. You need to add a TXT record to your domain's DNS. This TXT record will contain the SPF policy. The simplest and most effective record for this purpose is:
DNS TXT record for no mail sendingDNS
yourdomain.com IN TXT "v=spf1 -all"
Let's break down this record: v=spf1 declares the SPF version being used. -all is the mechanism we've discussed, indicating that any mail not explicitly authorized by preceding mechanisms (of which there are none in this case) should be rejected. This record essentially states, 'no server is authorized to send mail from this domain, and any mail claiming to be from it should be rejected.' For an even more explicit approach to denying all other senders, you can refer to our article on the SPF mechanism to explicitly deny other senders.
Once this TXT record is published in your DNS, it will take some time to propagate across the internet. After propagation, any mail server that performs an SPF check on an email claiming to be from yourdomain.com will see this record, determine no authorized senders exist, and reject the email. This effectively shuts down your domain's ability to send mail, intentionally and securely. It also helps prevent potential issues with email deliverability, where emails might otherwise be mistakenly sent and then blocklisted (or blacklisted).
DMARC's role in enforcing 'no mail' policies
DMARC's role in enforcing 'no mail' policies
While SPF's -all mechanism is powerful for signaling no mail sending, its enforcement can be significantly strengthened when combined with DMARC (Domain-based Message Authentication, Reporting & Conformance). DMARC adds a layer of policy enforcement and reporting on top of SPF and DKIM. This means that even if a receiving server doesn't fully respect the SPF hard fail, a DMARC policy can still instruct it to reject or quarantine the unauthorized email.
For a domain with v=spf1 -all, a DMARC policy set to p=reject or p=quarantine provides maximum protection. This combination ensures that not only is the SPF check failed, but the DMARC policy explicitly tells the receiving server how to handle the message. This dual authentication approach is the gold standard for securing domains, especially those that should never send mail. You can learn more about this by reading our simple guide to DMARC, SPF, and DKIM.
Monitor your DMARC reports with Suped
Even for domains with a v=spf1 -all record, DMARC reports are invaluable. They provide insights into any mail flow that attempts to spoof your domain, giving you visibility into potential threats. Suped offers a comprehensive DMARC monitoring solution that simplifies these reports, turning complex data into actionable recommendations.
AI-Powered Recommendations: Get clear, actionable advice to fix issues and strengthen your email security policy.
Real-Time Alerts: Stay informed about any unauthorized sending attempts from your domains.
Unified Platform: Monitor DMARC, SPF, DKIM, and blocklist data from one intuitive dashboard.
By proactively monitoring DMARC reports, even for non-sending domains, you maintain full control and visibility over your email ecosystem, ensuring that no malicious activity goes unnoticed. This reinforces your SPF policy and helps you keep your domains secure.
Conclusion
The SPF mechanism -all is the definitive way to declare that a domain should send no mail. Implementing this simple TXT record in your DNS is a powerful step in preventing email spoofing and protecting your brand. When combined with DMARC, it creates a robust defense, providing both enforcement and invaluable visibility into your domain's email activity. Ensuring all your domains, especially those not intended for sending email, are properly secured with this mechanism is a fundamental practice in maintaining strong email security and deliverability.