Suped

Summary

When implementing DMARC, choosing between SPF hardfail (-all) and softfail (~all) for your SPF record is a critical decision that impacts email deliverability and security. While hardfail might seem more secure due to its strict rejection policy, it can inadvertently block legitimate emails, especially in scenarios involving mail forwarding or inconsistent receiver behavior. Softfail, on the other hand, provides a more flexible approach, allowing DMARC to take precedence in determining the final disposition of a message.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers often wrestle with the SPF -all versus ~all dilemma, especially when DMARC is implemented. While the desire for maximum security is strong, practical experience often reveals that an overly strict SPF hardfail can lead to unintended consequences for deliverability, particularly in scenarios involving email forwarding or varying receiver implementations. Marketers prioritize ensuring legitimate emails reach the inbox while also protecting their brand from spoofing.

Marketer view

Email marketer from Email Geeks recommends softfail for SPF records, explaining that some MTAs might evaluate an SPF hardfail and bounce messages even if they are fully DMARC compliant with a valid DKIM signature. This prioritizes deliverability without compromising DMARC's overall security.

15 May 2024 - Email Geeks

Marketer view

An email marketer from AutoSPF notes that while SPF hardfail ensures unauthorized emails are completely blocked, its use should be cautious. This is because a genuine, DKIM-authorized email can still be rejected if it was relayed, highlighting a potential conflict with DMARC's broader authentication capabilities.

20 May 2024 - AutoSPF

What the experts say

Email deliverability experts largely agree that SPF hardfail (-all) is often counterproductive when DMARC is actively being used. The consensus shifts towards recommending SPF softfail (~all) to ensure that DMARC has the opportunity to evaluate both SPF and DKIM authentication results before determining message disposition. This approach accounts for real-world complexities like email forwarding and varied receiver implementations.

Expert view

Email expert from Email Geeks confirms that SPF -all is obsolete in the current DMARC landscape. They recommend using ~all in almost all cases, as DMARC's policy should be the primary enforcement mechanism for email authentication.

15 May 2024 - Email Geeks

Expert view

A technical expert from SpamResource explains that using SPF -all can be problematic because some receiving systems may reject emails that fail SPF hardfail immediately, without proceeding to evaluate DKIM or DMARC. This behavior can lead to legitimate email rejections, making softfail a safer choice when DMARC is active.

20 May 2024 - SpamResource

What the documentation says

Official documentation and best practices guides provide crucial insights into the intended use and implications of SPF hardfail versus softfail in the context of DMARC. These authoritative sources generally support the idea that DMARC should serve as the primary policy enforcer, allowing SPF to play a supportive role, especially given the complexities of email routing and forwarding. They highlight the importance of understanding the interaction between these protocols to maintain effective email authentication and deliverability.

Technical article

Official documentation from IETF Datatracker, specifically RFC 7489 on DMARC, states that DMARC does not produce or encourage elevated delivery privilege of authenticated email. It clarifies that DMARC is a mechanism for policy distribution, enabling increasingly strict handling of messages that fail authentication checks, rather than being solely reliant on a single protocol's immediate outcome.

1 June 2024 - IETF Datatracker

Technical article

The M3AAWG Best Practices document (Section 4) advises that for organizations adopting DMARC, using the SPF softfail qualifier (~all) is prudent. This approach helps to avoid immediate rejections of legitimate mail due to SPF failures, especially considering common scenarios like forwarding which can break SPF alignment, allowing DMARC to then rely on DKIM.

2 June 2024 - M3AAWG

11 resources

Start improving your email deliverability today

Get started