Suped

DMARC, SPF, and DKIM compliance on root domains not used for sending email

Summary

For root domains that are not actively used to send email, implementing robust DMARC, SPF, and DKIM policies is a critical cybersecurity measure. The overwhelming consensus among email marketing experts and official documentation is that a DMARC policy of p=reject should be applied to these non-sending root domains. This highly effective practice is essential for preventing domain spoofing, unauthorized brand impersonation, and phishing attacks, thereby safeguarding brand identity. While SPF and DKIM have specific roles, DMARC serves as the primary enforcement mechanism.

Key findings

  • DMARC Essential: A DMARC record with a p=reject policy is considered essential for root domains that do not send email, serving as a strong defense against spoofing and unauthorized use.
  • Spoofing Prevention: This p=reject policy actively instructs receiving mail servers to reject any emails that fail DMARC authentication and claim to originate from the non-sending root domain.
  • SPF for Non-Sending: An SPF record of v=spf1 -all is recommended for these domains to explicitly declare that no legitimate email originates from the root, further reinforcing anti-spoofing efforts.
  • DKIM Less Critical: DKIM is generally not considered necessary for root domains that do not send email, as its primary function is to authenticate sent messages.
  • Reporting Value: Even with a p=reject policy, setting up DMARC reporting is still advisable to gain visibility into potential spoofing attempts or unexpected mail flows.

Key considerations

  • Confirm No Sending: Before implementing a p=reject DMARC policy, thoroughly confirm that absolutely no legitimate email, including system-generated messages, originates from the root domain.
  • Subdomain Handling: If any subdomains are used for sending email, ensure they have correctly configured SPF and DKIM records, as the root domain's policies do not automatically cover them.
  • Monitor Reports: Although p=reject provides strong protection, DMARC reports should still be monitored to identify any attempts to spoof the domain and to confirm the policy's effectiveness.
Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

10 marketer opinions

Email marketing and cybersecurity professionals consistently advocate for implementing strong DMARC policies on all root domains, including those not actively engaged in sending email. There is broad agreement that a DMARC policy set to p=reject is the most effective approach for these non-sending domains. This crucial step prevents malicious actors from spoofing a brand's primary domain, thereby protecting the entire brand identity from phishing schemes and unauthorized usage, even when subdomains handle legitimate email traffic.

Key opinions

  • Universal DMARC Requirement: A DMARC record, specifically with a p=reject policy, is considered a non-negotiable requirement for root domains that do not send email.
  • Primary Anti-Spoofing Tool: The p=reject policy is the strongest directive to mail servers, ensuring any unauthorized emails using the domain are discarded, preventing brand impersonation.
  • Explicit SPF Denial: For non-sending root domains, an SPF record of v=spf1 -all is the standard practice, explicitly declaring that no legitimate email should originate from that specific domain.
  • DKIM's Limited Role: DKIM authentication is generally deemed unnecessary for root domains that do not send any email, as its primary function is to verify the integrity of outgoing messages.
  • Brand Security Imperative: Implementing these policies, particularly DMARC with p=reject, significantly fortifies an organization's overall email security posture and protects its digital brand identity.

Key considerations

  • Thorough Domain Audit: Before deploying a p=reject policy, conduct a comprehensive audit to ensure absolutely no legitimate, even unexpected, email originates from the root domain.
  • Monitoring DMARC Reports: While a p=reject policy offers robust protection, continued monitoring of DMARC reports is essential to gain insights into potential spoofing attempts and verify policy effectiveness.
  • Subdomain Policy Independence: Recognize that policies configured for the root domain do not automatically apply to subdomains; each subdomain sending mail requires its own correctly configured SPF and DKIM records.
  • Consider Silent Dropping: Be aware that a p=reject policy will cause failing emails to be silently dropped, meaning no bounce messages are returned to the sender.

Marketer view

Email marketer from Email Geeks explains that a DMARC record is absolutely needed on all domains, even those not used for sending email, to prevent spoofing. He suggests setting a p=reject policy immediately for root domains not used for mail.

8 May 2024 - Email Geeks

Marketer view

Email marketer from Email Geeks responds that while non-compliance on a non-sending root domain might not be a major concern, one should be wary about assuming no mail is sent without DMARC reporting. He advises that a p=reject policy is acceptable if one is okay with mail being silently dropped (noting pct=100 is redundant). He stresses it's good practice to have DMARC reporting, but acknowledges cases where it's not strictly necessary, and strongly recommends posting a DMARC policy at the apex domain.

16 Mar 2024 - Email Geeks

What the experts say

3 expert opinions

Experts emphasize that establishing DMARC compliance on root domains that do not send email is a crucial security strategy. Even if no legitimate mail originates from these domains, forged emails can trigger DMARC lookups, making a DMARC policy, especially a 'reject' or 'quarantine' directive, vital. While SPF and DKIM are typically not needed for such non-sending domains, DMARC actively safeguards against spoofing and brand impersonation, with reporting capabilities adding valuable oversight.

Key opinions

  • DMARC Prevents Spoofing: Implementing DMARC with a 'reject' or 'quarantine' policy on non-sending root domains is a critical defense against domain spoofing and unauthorized brand use.
  • Forgery Triggers DMARC: DMARC lookups for non-sending root domains can be triggered by forged mail, necessitating a protective DMARC record to manage these unauthorized attempts.
  • SPF and DKIM are Optional: For root domains not used for sending, SPF and DKIM records are not strictly required, as their primary function is to authenticate outbound mail.
  • Reporting for Oversight: Enabling DMARC reporting on these domains offers visibility into potential spoofing activities, even when no mail is intended to be sent.

Key considerations

  • Confirm No Sending Activity: Before applying a 'reject' DMARC policy, ensure no legitimate email, including system-generated notifications, ever originates from the root domain.
  • Monitor DMARC Reports: Regularly review DMARC reports to identify and analyze any attempts to spoof the domain, confirming the effectiveness of the applied policy.
  • Purpose of DMARC for Non-Senders: Understand that DMARC's role on non-sending domains is purely defensive- to signal that all mail from this domain should be treated as unauthorized.

Expert view

Expert from Email Geeks hypothesizes that DMARC compliance might appear on a root domain because mail has been received from it, potentially even forged mail, triggering a lookup. She suggests that publishing a DMARC record with reporting for such domains is a good idea.

4 Nov 2024 - Email Geeks

Expert view

Expert from Spam Resource explains that implementing a DMARC policy, particularly a 'reject' or 'quarantine' policy, on root domains that do not send email is a crucial security measure. This helps prevent the spoofing of these domains, even if SPF and DKIM records are not explicitly needed for non-sending domains.

31 Mar 2025 - Spam Resource

What the documentation says

4 technical articles

Leading authorities in email security, including DMARC.org, Google Workspace, and Microsoft Learn, along with the DMARC specification RFC 7489, collectively advise implementing a DMARC policy of p=reject for root domains that are not used to send email. This measure is consistently recommended as a robust defense against domain spoofing and unauthorized email use, effectively instructing receiving mail servers to reject messages that fail authentication for these dormant domains.

Key findings

  • Universal p=reject: Multiple authoritative sources, including DMARC.org, Google, and Microsoft, strongly recommend implementing a DMARC p=reject policy for root domains not actively sending email.
  • Spoofing Prevention: This policy directly combats domain spoofing, preventing malicious actors from sending unauthorized emails that appear to originate from the non-sending domain.
  • Clear Rejection Directive: A p=reject policy explicitly instructs recipient mail servers to discard any emails that fail DMARC authentication for the specified domain, ensuring strict enforcement.
  • Broad Applicability: The recommendation applies to any domain, regardless of its sending status, providing a critical layer of anti-spoofing protection even if subdomains are used for legitimate mail.
  • Specification Support: The DMARC specification (RFC 7489) underpins this best practice, highlighting DMARC's design to protect domains from unauthorized use, implicitly covering non-sending domains with strong policies.

Key considerations

  • Confirm Non-Sending: Before deploying a p=reject policy, meticulously verify that the root domain truly has no legitimate email, including system-generated messages, originating from it.
  • DMARC's Defensive Role: Understand that for non-sending domains, DMARC's purpose is purely defensive- to prevent unauthorized use rather than to authenticate legitimate outbound mail.
  • Monitor for Anomalies: Even with p=reject, ongoing monitoring of DMARC reports remains valuable to detect any attempts at domain misuse or unexpected mail flows.

Technical article

Documentation from DMARC.org explains that for domains not actively sending email, it is best practice to implement a DMARC policy of p=reject to prevent unauthorized use and spoofing. This provides strong protection even if subdomains are used for sending.

5 Sep 2024 - DMARC.org

Technical article

Documentation from Google Workspace Admin Help advises that implementing DMARC with a p=reject policy is a strong defense against spoofing for any domain, including those not directly sending email, as it tells receiving servers to reject messages that fail DMARC authentication for that domain.

6 Jan 2025 - Google Workspace Admin Help

Start improving your email deliverability today

Get started