Suped

Summary

Understanding why spoofed emails might pass DMARC authentication, especially when leveraging IPv6, requires a detailed look into how SPF, DKIM, and DMARC interact. Often, the issue isn't a flaw in DMARC itself but rather how the sending infrastructure is configured or how email forwarding and rewriting processes affect authentication headers. IPv6 addresses are increasingly common, and ensuring proper alignment with authentication protocols is crucial for maintaining email security and deliverability. This phenomenon can allow malicious emails, even if their content indicates spoofing, to bypass common email security checks.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers often face the challenge of distinguishing between legitimate and spoofed emails, even when authentication protocols seem to pass. The primary concern is that a DMARC pass, particularly with IPv6, could give a false sense of security, allowing malicious emails to land in inboxes. This highlights the need for continuous vigilance beyond technical configurations alone, as content and user behavior also play significant roles in identifying threats.

Marketer view

Email marketer from Email Geeks notes that emails can be hard to identify as odd, especially with IPv6.

06 Jun 2022 - Email Geeks

Marketer view

Marketer from Spiceworks Community observes that spoofed emails occasionally pass SPF, DKIM, and DMARC. This can happen if the spoofed email is sent from an email server with a different IP address than what is listed in the SPF record, but somehow still aligns.

21 May 2024 - Spiceworks Community

What the experts say

Experts in email deliverability acknowledge the complexities of DMARC authentication, particularly with the transition to and increased use of IPv6. They emphasize that a DMARC pass does not automatically guarantee a legitimate email, especially if the underlying SPF or DKIM mechanisms have been exploited or if the sender is part of a larger, legitimate service that attackers have leveraged. The nuance lies in understanding the full header chain and how each authentication step contributes to the final DMARC result.

Expert view

Expert from Email Geeks indicates that SPF passing and aligning with the From: domain ensures DMARC passes, even if the email appears suspicious.

06 Jun 2022 - Email Geeks

Expert view

Expert from Spamresource.com explains that while DMARC aims to prevent spoofing, it relies on SPF and DKIM. If an attacker can leverage a legitimate SPF entry for an IPv6 address, DMARC will pass.

22 Mar 2023 - Spamresource.com

What the documentation says

Official documentation for DMARC, SPF, and DKIM outlines the mechanisms for email authentication. These documents highlight that a DMARC pass relies on the alignment of either SPF or DKIM with the RFC5322.From: header. The presence of IPv6 addresses in SPF records is fully supported, and if a sending IP (IPv4 or IPv6) is listed as authorized, it will pass SPF. The core principle is that if the authentication records are correctly set up, even if exploited by an attacker using a legitimate but compromised sending service, the technical checks will pass.

Technical article

Documentation from Microsoft Support states that emails from account protection teams should be trusted. It indicates that the system is designed to send legitimate notifications, implying that any spoofing through this domain would be an unusual occurrence.

06 Jun 2022 - support.microsoft.com

Technical article

Documentation from AutoSPF indicates that SPF is a vital part of multi-legged email authentication, helping to prevent new-age phishing threats. It emphasizes the importance of accurate SPF records including IPv6 addresses.

01 Nov 2023 - autospf.com

11 resources

Start improving your email deliverability today

Get started