Suped

Summary

The choice between using ~all (softfail) or -all (hardfail) in your SPF record is a common point of discussion, especially with the widespread adoption of DMARC. Historically, -all was considered the more secure option, explicitly telling receiving servers to reject mail from unauthorized sources. However, in today's email ecosystem, where DMARC provides a more robust framework for defining how mail from unauthorized sources should be handled, the distinction between ~all and -all in SPF has become less critical for domains actively using DMARC.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers often navigate practical concerns when configuring SPF records, balancing security with the need for reliable email delivery. While the theoretical implications of ~all and -all are important, the real-world experiences with different email service providers (ESPs) and hosting platforms heavily influence their choices. Many prioritize avoiding deliverability issues over strict enforcement, especially when dealing with complex sending infrastructures or relying on DMARC for ultimate policy enforcement.

Marketer view

Marketer from Email Geeks notes that a security specialist recommended switching from ~all to -all, though they believe DMARC negates the practical difference in modern email security.

29 Dec 2021 - Email Geeks

Marketer view

Marketer from Salesforce Trailblazer Community reports SPF verification failures occurring due to the inclusion of an ESP, Pardot, within nested entries of their primary SPF record.

01 Jan 2022 - Salesforce Trailblazer Community

What the experts say

Email deliverability experts generally agree that the significance of ~all versus -all in SPF has evolved considerably with the introduction and widespread adoption of DMARC. While SPF still serves as a foundational authentication mechanism, DMARC now provides the overarching policy layer that dictates how receiving servers should treat emails that fail SPF or DKIM checks. Experts often emphasize a pragmatic approach, considering the full authentication stack rather than focusing solely on SPF's all qualifier.

Expert view

Expert from Email Geeks states that the choice between ~all and -all in SPF often doesn't make a significant difference in email deliverability outcomes in modern contexts.

29 Dec 2021 - Email Geeks

Expert view

Expert from Word to the Wise explains that SPF, defined by RFC 7208, is an authentication protocol designed to link the Return-Path address to authorized sending IP addresses for a domain.

13 Jun 2014 - Word to the Wise

What the documentation says

Official documentation, primarily RFC 7208 (Sender Policy Framework), defines the technical specifications and intended behavior of SPF records, including the all mechanism and its qualifiers. While these RFCs provide the foundational rules, they often describe ideal behavior rather than the nuances of real-world implementation across diverse mail systems. The documentation distinguishes clearly between a fail (hardfail) and a softfail (softfail), outlining the different levels of certainty regarding a sender's authorization.

Technical article

Documentation from RFC 7208, Sender Policy Framework, defines SPF as a mechanism for domain owners to specify which IP addresses are authorized to send mail from their domain, providing a foundational layer of email authentication.

Apr 2014 - RFC 7208

Technical article

Documentation from RFC 7208, Sender Policy Framework, clarifies that a "fail" result explicitly states the client's unauthorized use of the domain for the given identity, signaling to receiving servers that the email should likely be rejected.

Apr 2014 - RFC 7208

9 resources

Start improving your email deliverability today

Get started