Using sequential CNAMEs for email FROM domains involves specific technical considerations, primarily concerning DNS lookup performance and potential conflicts with essential email records like MX. While generally safe for depths of up to four and not impacting SPF query limits, placing CNAMEs at the root domain is problematic for email functionality. Separately, Cloudflare's extensive role in internet infrastructure raises significant ethical and privacy concerns. This stems from their stance on content neutrality, which has led to accusations of enabling bad actors, their practices of intermingling legitimate and illicit sites, and their processing of email metadata through services like Email Routing. Email marketers must weigh the technical implications of CNAMEs against these broader ethical and privacy considerations when designing their email infrastructure.
9 marketer opinions
The use of sequential CNAMEs for email FROM domains carries specific technical implications, largely centered on DNS resolution and compatibility with other critical email records. While moderate CNAME chains typically do not affect SPF query limits and are generally safe for DKIM, using them at a domain's root can create direct conflicts with MX records, hindering email deliverability. On the ethical front, Cloudflare's pervasive influence as an internet infrastructure provider raises substantial concerns, including privacy implications from its Email Routing service, accusations of enabling problematic content due to its content-agnostic policies, and broader questions about centralization and its potential impact on online discourse and data privacy.
Marketer view
Email marketer from Email Geeks explains that a chain of 2-3 CNAMEs is unlikely to cause issues. He clarifies that CNAMEs do not count towards SPF query limits, correcting his earlier statement. He also notes a minor concern that multiple CNAMEs could be perceived as hiding the actual domain.
26 Aug 2022 - Email Geeks
Marketer view
Email marketer from Email Geeks expresses wariness about using CNAMEs, particularly 'in-zone CNAMEs', advising to avoid them where possible due to potential brittleness in maintenance. He clarifies that CNAMEs do not affect SPF query limits and suggests that a depth of up to four CNAME chains is generally safe. Regarding Cloudflare, he details significant concerns: their corporate policy supporting white supremacists and doxing complainants, breaking TLS to sniff traffic, funding originating from schemes to extort money from ESPs, and a history linked to the 'Unspam' initiative. He further explains that Cloudflare intermingles legitimate companies with illicit sites (including child sexual abuse material and hate sites) to avoid being blocked by ISPs. While noting that using Cloudflare might not cause 'mechanical' reputation issues, he warns it could lead to less inclination from professionals to provide help and could pose future PR challenges if hosting information becomes more transparent.
1 Mar 2022 - Email Geeks
3 expert opinions
Concerns regarding Cloudflare's ethical stance and its operational practices are significant, particularly their role in protecting websites associated with illicit activities. Experts highlight that Cloudflare's commitment to content neutrality has led to criticisms that it effectively shields malicious actors, including those involved in child abuse, criminal enterprises, spam, and malware distribution. This policy, despite being framed as upholding free speech, is seen by some as actively facilitating online abuse. Furthermore, Cloudflare's past technical issues and the strategic intermingling of legitimate and illicit sites contribute to the debate surrounding their responsibility as a major internet infrastructure provider.
Expert view
Expert from Email Geeks highlights that Cloudflare protects entities involved in child abuse materials and criminal enterprises like The Silk Road. She also notes their past broken DNS configurations that required ISPs to implement workarounds, and their strategy of intermingling legitimate websites with illicit ones to avoid boycotts.
12 Mar 2025 - Email Geeks
Expert view
Expert from Spam Resource explains that Cloudflare's services, by protecting websites that engage in spam and other abuse, raise concerns about whether they are inadvertently enabling such activities. It suggests Cloudflare could implement stricter policies to restrict access for known spammers.
15 Aug 2023 - Spam Resource
5 technical articles
The use of sequential CNAMEs for email FROM domains introduces technical hurdles such as increased DNS lookup overhead, which can lead to resolution delays or failures for the FROM domain itself or associated authentication records like DKIM. Cloudflare's CNAME flattening technique, while optimizing root domain resolution, might inadvertently alter the expected lookup behavior for crucial email authentication records like SPF, DKIM, and DMARC, potentially compromising deliverability. Beyond technical aspects, Cloudflare's services present significant ethical and privacy dilemmas. Their Email Routing service, by processing email headers and content, inherently raises privacy questions about data handling. Furthermore, their stated commitment to 'internet neutrality' has drawn criticism for potentially enabling controversial or illicit content, while their extensive data collection practices across a vast internet footprint prompt overarching concerns about user data aggregation and utilization.
Technical article
Documentation from RFC 1034 explains that CNAME records, when chained (sequential CNAMEs), can introduce performance overhead due to multiple lookup iterations required to resolve the final A or AAAA record. It notes that while resolvers should follow chains, excessively long chains can lead to delays or potential failures in resolution, which would directly impact the ability of mail servers to resolve the email FROM domain or associated records like DKIM.
15 Sep 2022 - RFC 1034 - Domain Names - Concepts and Facilities
Technical article
Documentation from Cloudflare explains that CNAME flattening, a technique used by some DNS providers like Cloudflare, resolves CNAMEs at the root domain (apex) into A or AAAA records. While this can make the root domain act like a CNAME, it might have implications for email, especially if sensitive email-related records (like DMARC, SPF, or DKIM) are expected to resolve via a CNAME chain and the flattening changes the lookup behavior, potentially impacting deliverability or authentication.
7 Jul 2023 - Cloudflare Blog
Does using different domains in From and Reply-To email addresses affect deliverability?
What are the best practices for SPF records and avoiding CNAMES for email authentication?
What are the considerations for using different domains for From, DKIM, and SPF?
What are the ethical concerns of using Cloudflare for online content protection?
What are the implications of using different root and subdomain email addresses in From and Reply-To fields?
What issues occur when adding DKIM record to DNS via CName with Cloudflare?