Suped

How to verify DMARC, DKIM, and SPF setup?

Michael Ko profile picture
Michael Ko
Co-founder & CEO, Suped
Published 4 Aug 2025
Updated 19 Aug 2025
8 min read
Email authentication protocols like Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and Domain-based Message Authentication, Reporting & Conformance (DMARC) are fundamental to ensuring your emails reach the inbox. Without them, your legitimate messages are far more likely to be flagged as spam or rejected outright by recipient mail servers. These protocols act as digital safeguards, proving that your emails are truly from your domain and haven't been tampered with in transit.
The challenge often lies in correctly setting them up and, more importantly, verifying that they are functioning as intended. It's not uncommon to encounter discrepancies between what different online tools report or to find that emails are still hitting the spam folder despite having 'set up' these records. This can be a source of significant frustration for email senders.
This guide will walk you through the most reliable methods for verifying your DMARC, DKIM, and SPF setup, ensuring your email infrastructure is robust and your messages have the best chance of successful delivery. We'll cover DNS lookups, email header analysis, and common troubleshooting steps.
Suped DMARC monitoring
Free forever, no credit card required
Learn more
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

Understanding email authentication records

Before diving into verification, it helps to have a clear understanding of what each protocol does. Think of them as different layers of security for your email. SPF verifies the sender's IP address, DKIM adds a digital signature to the email, and DMARC ties them both together while dictating how receiving servers should handle emails that fail authentication. For a more detailed breakdown, you can read our guide on how SPF, DKIM, and DMARC work.
When you set up these records, you're essentially publishing specific instructions in your domain's Domain Name System (DNS). These instructions tell recipient mail servers whether an email claiming to be from your domain is legitimate. Incorrect or missing records are a primary cause of email deliverability issues, often leading to emails being sent directly to the spam or junk folder.
The key is to ensure that these published DNS records are syntactically correct and accessible to receiving mail servers worldwide. Even a small typo or misconfiguration can render your authentication ineffective. This is why thorough verification is absolutely essential for maintaining a strong sender reputation and achieving excellent inbox placement.

Initial checks of your DNS records

The first step in verification is to directly check your domain's DNS records. These records are publicly available, and various online tools can help you perform these lookups. However, remember that DNS propagation can take up to 48 hours for changes to reflect globally, so patience is sometimes required after making updates.

Checking SPF records

An SPF record is a TXT record that specifies which IP addresses are authorized to send email on behalf of your domain. You should only have one SPF record per domain to avoid validation issues. You can use a tool like Kitterman SPF validator to check its syntax and included mechanisms. You can also perform a manual lookup using a command-line tool like dig.

Checking DKIM records

DKIM records are also TXT records, but they are typically placed under a specific subdomain, known as a selector (e.g., selector1._domainkey.yourdomain.com). The selector is provided by your email service provider. To verify, you'll need this selector. You can use online DKIM lookup tools or dig to query the specific DKIM TXT record. Ensure the p= tag in your DKIM record is not empty.

Checking DMARC records

DMARC records are also TXT records, placed at _dmarc.yourdomain.com. These records define your DMARC policy and reporting addresses. Tools like the dmarcian domain checker are excellent for verifying your DMARC record's presence and syntax. Ensure your policy (p=) is correctly set (e.g., p=none, p=quarantine, or p=reject). For more on DMARC policies, see our list of DMARC tags.
Example DNS lookup commandsBASH
dig TXT yourdomain.com dig TXT selector1._domainkey.yourdomain.com dig TXT _dmarc.yourdomain.com

Analyzing email headers for verification

While DNS checks confirm your records exist, the most definitive way to verify your SPF, DKIM, and DMARC setup is by sending a test email and examining its headers. This shows how recipient mail servers actually interpret your authentication records.

How to check email headers

Send an email from your configured domain to a common email service like google.com logoGmail, microsoft.com logoOutlook, or yahoo.com logoYahoo Mail. Once received, locate the option to Show Original or View Message Source. This will display the full email headers, a trove of information about its journey. Several online tools also allow you to paste raw email headers for analysis, providing a user-friendly breakdown, for example as detailed by Alitajran and Mimecast.

Interpreting the Authentication-Results header

Look for the Authentication-Results header. This is where you'll find the verdict for SPF, DKIM, and DMARC. A successful setup will show spf=pass, dkim=pass, and dmarc=pass. Pay close attention to DMARC's alignment, which means the domain in the From header (visible to the recipient) aligns with the domains checked by SPF or DKIM. Without alignment, DMARC will fail even if SPF and DKIM pass individually.

Key header elements for verification

  1. Received-SPF: Shows the SPF result (Pass, Fail, Softfail, Neutral, None, PermError, TempError). A Pass indicates the sending IP is authorized.
  2. DKIM-Signature: Contains the digital signature and details like the signing domain and selector. Its presence and validity are crucial for DKIM to pass.
  3. Authentication-Results: This header provides the overall results for SPF, DKIM, and DMARC. Look for dmarc=pass to confirm DMARC compliance.

Common verification challenges and troubleshooting

Even with careful setup, issues can arise. Misconfigurations can lead to authentication failures, resulting in your emails being flagged as spam or rejected outright, sometimes even leading to your sending IP or domain being placed on an email blocklist (or blacklist). Understanding common pitfalls can help you quickly troubleshoot and fix problems.
One frequent issue is having multiple SPF records for a single domain. SPF is designed to only have one TXT record starting with v=spf1. If you have more, mail servers won't know which to use, leading to a PermError and SPF failure. Combining all authorized senders into a single SPF record is essential.
Another common problem involves DKIM key rotation or incorrect selectors. If the DKIM selector in your DNS doesn't match the one used by your sending service, DKIM authentication will fail. Similarly, DMARC alignment issues, where the From domain doesn't align with the SPF or DKIM domains, can lead to DMARC failure even if SPF and DKIM pass individually. For more on this, check our article on why your emails get DMARC verification failed errors.
Finally, remember that DNS changes can take time to propagate across the internet. If you've just updated your records, wait a few hours before re-checking. Patience is key. If you're encountering persistent issues, a deeper dive into your DNS configuration and email service provider settings might be necessary. Tools are great for initial checks, but always trust the email headers for the final verdict on authentication. For specific troubleshooting, our guides on troubleshooting DMARC failures and fixing SPF and DMARC settings are valuable resources.

Common issues

  1. Multiple SPF records: Having more than one TXT record starting with v=spf1 will cause SPF to fail.
  2. DKIM selector mismatch: The selector used in the email signature doesn't match the DNS record.
  3. DMARC alignment failure: The domain in the From header doesn't align with the domains checked by SPF or DKIM.
  4. DNS propagation delays: New DNS records can take up to 48 hours to update globally.

Troubleshooting steps

  1. Consolidate SPF records: Combine all include mechanisms into a single SPF record.
  2. Verify DKIM selector: Ensure the selector in your DNS matches what your ESP provides.
  3. Check DMARC alignment: Confirm that the DMARC From domain matches SPF or DKIM domains.
  4. Wait for propagation: Allow sufficient time for DNS changes to propagate before re-testing.

Views from the trenches

Best practices
Always use a comprehensive DMARC monitoring solution to track authentication results.
Regularly review DMARC aggregate reports to identify authentication failures.
Maintain a single, consolidated SPF record to prevent 'too many lookups' errors.
Ensure DKIM selectors are correctly configured and match your sending platform.
Common pitfalls
Relying solely on one online checker, as results can sometimes be inconsistent.
Forgetting to check DMARC alignment, even if SPF and DKIM pass individually.
Not waiting for full DNS propagation after making record changes.
Ignoring DMARC reports, which contain critical insights into email authentication.
Expert tips
Implement DMARC with a 'p=none' policy initially to gather data without impacting delivery.
Use email header analysis as the ultimate verification method for all three protocols.
Automate the monitoring of your DMARC, DKIM, and SPF records for proactive issue detection.
Be aware of how email forwarding can affect SPF and DKIM authentication results.
Marketer view
Marketer from Email Geeks says the dmarcian checker has generally been pretty accurate when checking DMARC policies.
2018-06-25 - Email Geeks
Marketer view
Marketer from Email Geeks says one can also manually verify a DMARC policy by performing a dig request for the TXT record at _dmarc.yourdomain.com.
2018-06-25 - Email Geeks

Maintaining email authentication health

Verifying your DMARC, DKIM, and SPF setup is a critical step in ensuring your emails are authenticated and delivered reliably. While online tools offer a quick initial check, a thorough verification process involves directly inspecting your DNS records and, most importantly, analyzing the headers of emails you send.
By understanding what each record entails and how to interpret authentication results in email headers, you gain confidence that your domain is protected against spoofing and phishing attempts. This diligence translates directly into improved email deliverability and a stronger sender reputation with major mailbox providers like gmail.com logoGmail and outlook.com logoOutlook.
Regular monitoring of your authentication status and DMARC reports is highly recommended. This proactive approach allows you to catch and resolve any issues swiftly, maintaining peak email performance and ensuring your messages always reach their intended recipients. Building a robust email sending infrastructure is an ongoing process, and proper authentication is its cornerstone.

Frequently asked questions

DMARC monitoring

Start monitoring your DMARC reports today

Suped DMARC platform dashboard

What you'll get with Suped

Real-time DMARC report monitoring and analysis
Automated alerts for authentication failures
Clear recommendations to improve email deliverability
Protection against phishing and domain spoofing