The structure of an email message involves multiple From addresses, each serving a distinct purpose in the email's journey from sender to recipient. The primary concern raised regarding multiple 'envelope from' addresses often stems from a misunderstanding of these different fields, particularly the MAIL FROM (or Envelope From), the From: header (or Header From), and the Return-Path header. While a single email message should strictly contain only one of each of these core sender identifiers, observations of apparent duplication, such as multiple Return-Path headers, typically point to a misconfiguration or bug rather than an intentional practice. Conversely, having multiple DKIM signatures is normal and common, often with an ESP adding its own signature alongside the sender's, and does not negatively impact deliverability as long as one signature aligns with the DMARC policy.
Key findings
Single identity: An email message is designed to have a single Envelope From (RFC 5321.From), a single From: header (RFC 5322.From), and ideally a single Return-Path header.
Return-path duplication: Observing multiple Return-Path headers is a sign of a technical bug or misconfiguration, though it's typically non-catastrophic, with the latter duplicates often being ignored.
Multiple DKIM signatures: Having several DKIM signatures on a single email is normal and commonly occurs when an Email Service Provider (ESP) adds their own signing in addition to the sender's.
DMARC alignment: For DMARC authentication to pass via DKIM, at least one of the DKIM signatures must align with the domain in the From: header. This is a critical component of email deliverability.
RFC compliance: RFC 5322, which defines the internet message format, explicitly states that a message must contain a single From: header.
Obsolete standards: Older authentication methods like DomainKeys (RFC 4870) are now obsolete, and their presence can indicate outdated email sending practices.
Key considerations
Regular header checks: Periodically inspect your email headers to identify any unintended duplication of critical fields, such as Return-Path, which could signal underlying configuration issues.
Impact on deliverability: While a duplicate Return-Path might not directly lead to email rejection, such anomalies can contribute to a perception of non-standard practices and potentially affect your overall domain reputation.
Authentication focus: Prioritize the correct setup of SPF, DKIM, and DMARC to ensure proper alignment and authentication. These are crucial for consistent inbox placement, especially given evolving bulk sender requirements from major ISPs.
ESP practices: Understand how your Email Service Provider (ESP) handles email authentication, particularly if they add additional DKIM signatures. Confirm that at least one DKIM signature aligns with your domain for DMARC to pass.
Header size management: While not directly related to multiple 'envelope from' addresses, an excessive number of headers, such as too many DKIM signatures or other fields, can lead to recipient mail servers rejecting messages due to headers too large errors.
What email marketers say
Email marketers often focus on the visible aspects of email marketing: content, design, and calls to action. However, the underlying technical structure of an email, including its various 'from' addresses, can significantly impact deliverability. When marketers observe unusual header configurations, such as multiple Return-Path headers, their primary concern quickly shifts to how such anomalies might affect inbox placement, especially with new bulk sender requirements from major ISPs like Google and Yahoo. Their discussions highlight a practical need to understand obscure technical details and their real-world implications on email campaigns.
Key opinions
Header confusion: Marketers sometimes encounter email messages with what appear to be duplicate 'envelope from' or Return-Path headers, leading to questions about whether this is intentional or a technical error.
Deliverability impact: A primary worry for marketers is how such unusual header configurations could negatively impact email deliverability, potentially causing messages to be blocked or routed to spam folders.
ISP requirements: The evolving bulk sender requirements from Google and Yahoo, which emphasize robust authentication like SPF and DKIM, intensify concerns about any potential technical misalignments.
ESP role: Questions arise about whether email service providers adding a second DKIM signature will cause sending problems or if it properly aligns for DMARC.
Key considerations
Proactive monitoring: Regularly monitor email deliverability and inbox placement rates to quickly identify any issues stemming from header oddities or other technical misconfigurations.
Authentication clarity: Seek clarity from ESPs on their authentication practices, especially regarding additional DKIM signatures, to ensure proper DMARC alignment and compliance.
Technical compliance: Even if not directly involved in header construction, understanding basic email etiquette and technical rules, such as those related to From and Reply-to addresses, is crucial for avoiding deliverability pitfalls.
Learning from anomalies: Treat unexpected header configurations as opportunities to learn more about email infrastructure and troubleshoot potential deliverability issues before they escalate.
Marketer view
Email marketer from Email Geeks observed emails with what appeared to be duplicate 'envelope from' addresses in their inbox. This raised questions about whether such duplication was intentional or a technical anomaly. The unexpected presence of multiple sender identifiers prompted a deeper inquiry into standard email practices and potential impacts on email handling by recipient servers.
12 Dec 2023 - Email Geeks
Marketer view
Email marketer from Email Geeks expressed concern about new bulk sender requirements from Google and Yahoo, which mandate both SPF and DKIM for high-volume sending. They queried whether an Email Service Provider (ESP) adding a second DKIM signature might cause a sending problem or if an additional 'envelope from' would properly align for DMARC under these new rules.
12 Dec 2023 - Email Geeks
What the experts say
Email experts are quick to clarify the nuances of email headers, distinguishing between the various 'from' addresses and their roles. They emphasize that while some elements, like multiple DKIM signatures, are perfectly normal and even beneficial for authentication, others, such as duplicated Return-Path headers, are technical bugs. Their insights underscore the importance of RFC compliance for robust email delivery and authentication, especially in the context of evolving sender requirements from major Internet Service Providers (ISPs).
Key opinions
Header differentiation: Experts clearly distinguish between the Envelope From (or SMTP MAIL FROM, RFC 5321) and the From: header (RFC 5322), noting that a single message should have only one of each.
Return-path status: Multiple Return-Path headers are indicative of a bug or misconfiguration rather than intended design, though they are often ignored and not catastrophic.
DKIM normalcy: It is considered normal and common to find multiple DKIM signatures on an email, and this has no adverse effect as long as one of them successfully aligns for DMARC.
RFC compliance: Adherence to RFCs, particularly RFC 5322 which mandates a single From: header, is essential for an RFC-compliant message.
Header size risk: An excessive number of signatures, especially outdated ones like DomainKeys, can lead to excessively large email headers, which may result in rejection by some mail servers.
DomainKeys obsolescence: DomainKeys (RFC 4870) is an obsolete standard, superseded by DKIM, and its presence can indicate an outdated sending infrastructure.
Key considerations
Precise terminology: Using accurate terms for email components (e.g., envelope from, header from, Return-Path) is fundamental for effective diagnosis and communication regarding email deliverability issues.
DMARC strategy: A robust DMARC implementation should prioritize ensuring at least one DKIM signature or SPF record aligns with the domain in the From: header, a requirement that helps prevent DMARC verification failures.
Header efficiency: While multiple legitimate DKIM signatures are fine, vigilance is needed to avoid unnecessary headers or an excessive number of signatures that could bloat email size and lead to rejection by some mail servers.
Modern authentication: Senders should focus on current authentication standards like DKIM and disregard obsolete ones like DomainKeys to maintain optimal deliverability and reputation. This also means being careful about what RFC 5322 says versus what actually works.
Expert view
Email expert from Email Geeks clarifies that a single message cannot have more than one envelope from address, which refers to the FROM command used during the SMTP conversation. They highlight the distinction between this and the From: header that recipients see.
12 Dec 2023 - Email Geeks
Expert view
Email expert from Email Geeks further explains that the envelope from is the RFC 5321 From, while the header From is the RFC 5322 From. This distinction is fundamental to understanding how emails are processed and authenticated at different stages of delivery.
12 Dec 2023 - Email Geeks
What the documentation says
The foundational rules for email message structure and transmission are meticulously laid out in various Request for Comments (RFCs) documents from the Internet Engineering Task Force (IETF). These standards define how email components, including different 'from' addresses, should behave. They clarify that an email message should have a singular Envelope From (RFC 5321 MAIL FROM) and a singular Header From (RFC 5322 From:). While multiple DKIM signatures are allowed and common, issues arise when core headers are duplicated outside of their defined roles, even if some receiving servers are forgiving.
Key findings
SMTP standards: RFC 5321 (SMTP) defines the MAIL FROM command, which serves as the envelope from address for bounces, and mandates a single instance per message.
Message format: RFC 5322 (Internet Message Format) explicitly states that an email message MUST contain a single From: field, which is the sender address visible to recipients.
DMARC authentication: RFC 7489 (DMARC) specifies that DMARC authentication hinges on either the SPF domain or a DKIM signing domain aligning with the domain found in the RFC 5322 From: header.
DKIM allowance: The DKIM specification permits the inclusion of multiple valid DKIM signatures within a single email message, often to support different signing entities (e.g., sender and ESP).
Return-path behavior: While RFCs primarily define the MAIL FROM (which becomes Return-Path), the presence of multiple Return-Path headers is not compliant with typical MTA behavior and indicates an issue.
Key considerations
Adherence to standards: Strict adherence to RFCs is paramount for ensuring consistent email deliverability and preventing issues with receiving mail servers that validate messages against these standards.
Header integrity: The uniqueness and correct formation of critical headers like From: are fundamental for trust and authentication, impacting how recipients and filters perceive the sender.
Authentication evolution: While older standards like DomainKeys existed, senders should prioritize implementing and maintaining modern authentication protocols such as DKIM, SPF, and DMARC for optimal performance. You can read more on this at the Bitsight blog, which also discusses domain insecurity and DMARC.
Role of the ESP: Email Service Providers play a crucial role in correctly setting the Return-Path and applying DKIM signatures. Senders should verify their ESP's compliance with RFCs and authentication best practices.
Technical article
Documentation from Medium, in its deep dive into emails, clarifies the distinction between the SMTP envelope and email headers. It explains that the envelope, containing the MAIL FROM (Envelope From), is crucial for the transmission process, while headers like From: are part of the message content itself.
08 Sep 2020 - Medium
Technical article
Documentation from OneSignal's glossary emphasizes that the email envelope plays a critical role in determining email deliverability. This is because the envelope contains the actual sender and recipient addresses used during the SMTP conversation, which dictate whether a message is accepted or rejected by a receiving server.