Suped

An advanced guide to email authentication - beyond the basics

Michael Ko profile picture
Michael Ko
Co-founder & CEO, Suped
Published 11 Jul 2025
Updated 14 Jul 2025
7 min read
A shield with a checkmark icon for email authentication security.
If you are in the email world, you have undoubtedly heard about SPF, DKIM, and DMARC. You have probably already set them up for your domain, following guides and best practices. But setting up the basic records is just the first step. True email authentication mastery goes much deeper, into alignment issues, technical limitations, and strategic policy decisions that make or break your email deliverability and security.
There are nuances that separate a basic configuration from a robust one. Advanced topics include DMARC alignment, the infamous SPF 10-lookup limit, a safe path to a restrictive policy, and the emerging standards that build upon this foundation. It is time to go beyond the basics and truly secure your email sending reputation.
A key fitting into a lock with a checkmark on it.

The critical role of DMARC alignment

One of the most misunderstood concepts in DMARC is alignment. It is not enough for an email to pass SPF or DKIM checks; for DMARC to pass, the domain used for those checks must match the domain in the visible 'From' address. This is the mechanism that actually prevents spoofing. An email can have a valid SPF record and a valid DKIM signature, but if they are for a different domain than the one your recipients see, DMARC will fail.
For SPF alignment, the domain in the 'Return-Path' (also known as the 'envelope from' or 'MailFrom') address must match the 'From' header domain. This often breaks when using third-party services that handle bounces on their own domain. For DKIM, the domain specified in the signature's d= tag must match the 'From' header domain. This is generally easier to control, because you can often configure your sending services to sign with a key for your domain.
DMARC allows for two alignment modes: relaxed and strict. Relaxed alignment, the default, allows subdomains to match the parent domain. For example, an email from marketing.example.com can pass DMARC for example.com. Strict alignment requires an exact domain match. Choosing the right mode depends on your organization's email infrastructure and security requirements.

Passes authentication, fails alignment

An email is sent from you@yourdomain.com, but through a third-party service.
  1. SPF passes using the service's domain (sendingservice.com). PASS
  2. The SPF domain (sendingservice.com) does not match the 'From' domain (yourdomain.com). FAIL

Passes authentication and alignment

The same email, but the service is configured to use your domain for DKIM signing.
  1. DKIM passes using a key associated with yourdomain.com. PASS
  2. The DKIM domain (yourdomain.com) matches the 'From' domain (yourdomain.com). PASS
The Sender Policy Framework (SPF) has a well-known and often frustrating limitation: a maximum of 10 DNS lookups are allowed per check. Every time a receiving server evaluates your SPF record, it counts mechanisms like include, a, mx, and redirect against this limit. If your record exceeds 10 lookups, it will result in a permanent error (PermError), and SPF authentication will fail. This becomes a significant problem for businesses that use many cloud services, each requiring its own include.
One advanced technique to manage this is using SPF macros. Macros are variables that can be inserted into an SPF record, which are then replaced with values from the email being processed. For example, you could create a specific subdomain for a vendor and use macros to check the sending IP against a record for that vendor, reducing the number of static include mechanisms in your main record.

Example of a dynamic SPF record

SPF Record with Macros
v=spf1 include:%{ir}._ip.%{v}._spf.example.com ~all

Understanding the example

This record uses the IP address of the sender (%{i}, reversed as %{ir}) and the domain name (%{v}) to construct a unique DNS query. This offloads the lookup logic to a different part of your DNS.
While powerful, macros add complexity. An alternative approach is 'SPF flattening', where you resolve all the IP addresses from your include mechanisms into a single record of ip4 and ip6 ranges. Using a platform like Suped simplifies this process, whereas manual flattening creates a maintenance burden, because you must constantly monitor your vendors' sending IPs for changes and update your record accordingly. Failure to do so causes legitimate emails to be blocked.

From monitoring to enforcement with DMARC

A DMARC record is not a 'set it and forget it' tool. Its true power comes from the reports it generates. By setting your policy to p=none, you enter a monitoring-only mode. This is the crucial first phase. You must use a DMARC monitoring service like Suped to parse the aggregate (RUA) reports that mailbox providers send you. These reports give you a complete picture of who is sending email on behalf of your domain, and whether those emails are passing or failing authentication checks.
The goal is to move methodically from p=none to p=quarantine and ultimately to p=reject. Rushing this process is a common mistake that causes legitimate emails to be sent to spam or blocked entirely. The DMARC policy escalation should only begin after you have identified and correctly configured all your legitimate sending sources to pass DMARC matching.
  1. Start with p=none. Collect and analyze RUA reports for several weeks to get a comprehensive view of your email ecosystem.
  2. Identify all legitimate sources. Work to bring any non-compliant but legitimate senders into proper configuration through proper SPF and DKIM setup.
  3. Use the pct tag. When moving to p=quarantine or p=reject, start with a small percentage, like pct=5, to limit the impact of any mistakes.
  4. Increase percentage gradually. As you gain confidence that no legitimate mail is being affected, slowly increase the pct value towards 100.
  5. Aim for p=reject. This is the ultimate goal, providing the strongest protection against domain spoofing and phishing attacks.
A progress bar with icons representing monitoring, quarantine, and reject stages.

The next frontier: BIMI and MTA-STS

Once you have achieved a DMARC enforcement policy, you can explore emerging standards that build upon it. Brand Indicators for Message Identification (BIMI) is an email specification that allows you to display your company's logo next to your authenticated emails in the recipient's inbox. It is a visual verification of your brand's identity and is a powerful way to increase brand recognition and trust.
Implementing BIMI is not simple. It has strict prerequisites, the most important being a DMARC policy of p=quarantine or p=reject at 100%. You also need a specific SVG Tiny 1.2 format logo hosted publicly, and for many mail providers, a Verified Mark Certificate (VMC). A VMC is a digital certificate that proves your ownership of the trademarked logo. This effectively ties your marketing to your security posture, providing a clear incentive for strong DMARC enforcement.
Another important standard is MTA-STS (Mail Transfer Agent Strict Transport Security). While SPF, DKIM, and DMARC authenticate the sender, MTA-STS secures the connection itself. It ensures that when email is transmitted between mail servers, the connection is always encrypted with TLS. This prevents man-in-the-middle and downgrade attacks where an attacker forces a connection to be unencrypted to intercept the email's contents. It is another crucial layer in a defense-in-depth email security strategy.
DMARC monitoring

Start monitoring your DMARC reports today

Suped DMARC platform dashboard

What you'll get with Suped

Real-time DMARC report monitoring and analysis
Automated alerts for authentication failures
Clear recommendations to improve email deliverability
Protection against phishing and domain spoofing