SPF, DKIM, and DMARC are the three email authentication protocols that together prove your email is legitimate. SPF (Sender Policy Framework) lists which servers can send for your domain via DNS. DKIM (DomainKeys Identified Mail) cryptographically signs each message. DMARC ties SPF and DKIM results to the visible From: address and tells receivers what to do with failures. All three are published as DNS records — no software install required. Every domain that sends email needs all three configured.
SPF, DKIM, DMARC Explained: The Three-Letter Email Authentication Stack
The Three Protocols, Briefly
Email authentication protocols SPF, DKIM, and DMARC each solve a piece of the spoofing problem:
| Protocol | What it does | Where it lives |
|---|---|---|
| SPF | Lists authorized sending servers | DNS TXT record |
| DKIM | Cryptographically signs messages | DNS TXT (key) + message header (signature) |
| DMARC | Ties SPF/DKIM results to visible From: + sets policy | DNS TXT record at _dmarc.yourdomain.com |
The complete email DNS records spf dkim dmarc trio is now table stakes — Gmail, Yahoo, and Microsoft all require it for bulk senders.
SPF: Sender Policy Framework
SPF publishes which servers can send mail for your domain. Receivers check the SPF record and verify the sending IP is authorized.
A typical SPF record:
v=spf1 include:_spf.google.com include:sendgrid.net -all
Strengths:
- Simple to publish
- Prevents many spoofing attacks
- Required by all major providers
Limitations:
- Checks envelope sender (Return-Path), not visible From:
- Breaks on forwarding
- Limited to 10 DNS lookups
- Doesn't sign anything cryptographically
DKIM: DomainKeys Identified Mail
DKIM cryptographically signs each outgoing message with a private key. Receivers fetch the matching public key from DNS and verify the signature.
Components:
- Private key: held by sending infrastructure
- Public key: published in DNS at
selector._domainkey.yourdomain.com - DKIM-Signature header: added to each message
Strengths:
- Survives forwarding (signature stays with message)
- Cryptographically tamper-proof
- Multiple selectors enable key rotation
Limitations:
- More complex to set up than SPF
- Body changes (mailing list footers, etc.) can invalidate signatures
- Requires DNS publication and ESP support
DMARC: The Policy Layer
DMARC sits on top of SPF and DKIM:
- Checks that SPF or DKIM passed
- Checks that the passing protocol aligns with the visible From: domain
- Tells receivers what to do with failures (none, quarantine, reject)
- Requests reports back to sender
A starting DMARC record:
v=DMARC1; p=none; rua=mailto:[email protected]
Without DMARC, SPF and DKIM each protect their own piece — but an attacker can pass SPF with their own domain and spoof your From:. DMARC closes that gap.
How They Work Together
When Gmail receives your email:
- SPF check: Is the sending IP authorized? Yes/No.
- DKIM check: Does the signature verify? Yes/No.
- DMARC check: Does at least one of SPF/DKIM pass AND align with the visible From: domain?
- Policy enforcement: If DMARC fails, apply the policy (none/quarantine/reject).
Both SPF and DKIM need to be set up properly for DMARC to work reliably. Most senders run both for redundancy: SPF for envelope-level protection, DKIM for content-level protection.
DKIM vs SPF vs DMARC: Which to Set Up First
Order: SPF → DKIM → DMARC. You can publish all three on day one if you control your sending infrastructure. For complex setups:
- SPF first — fastest to publish, immediate impact
- DKIM next — requires ESP coordination
- DMARC at
p=none— monitor reports before enforcing - Advance DMARC to
p=quarantinethenp=rejectover 4-12 weeks
See DMARC setup guide for the full progression.
Common Mistakes
- Publishing SPF without DKIM (or vice versa) and assuming DMARC will protect you
- Hard-coding
+allor~allin SPF (should be-all) - Not monitoring DMARC reports before advancing policy
- Forgetting to include third-party senders (SaaS tools, CRM, e-signature) in SPF
- DKIM signing with the wrong domain (breaks alignment)
How to Verify Everything Is Working
Send a test email to [email protected]. The report shows:
- SPF: pass/fail
- DKIM: pass/fail with selector
- DMARC: pass/fail with alignment status
- Suggested fixes
Or use MXToolbox: mxtoolbox.com/SuperTool.aspx → enter your domain.
For ongoing monitoring, set up a DMARC report processor like Mailhardener, dmarcian, or Google's free Postmaster Tools.
Practitioner note: The most common SPF DKIM DMARC explained-but-not-implemented pattern: senders publish SPF and DKIM, then publish DMARC at
p=none— and never advance.p=nonedoesn't protect you from spoofing; it only monitors. Advance top=quarantinewithin 6-8 weeks of clean reports, then top=rejectafter another 4-8 weeks.
Practitioner note: When auditing client deliverability, I find unauthenticated third-party senders in roughly 90% of cases. The SaaS world has exploded — Calendly, Loom, ActiveCampaign, e-signature tools, ticketing systems — and each one sending under your domain needs SPF inclusion and DKIM. DMARC reports surface these instantly.
Practitioner note: Email authentication protocols SPF DKIM DMARC are necessary but not sufficient. They prevent spoofing and improve trust, but they don't fix list quality or content issues. Authentication is the foundation; list hygiene and engagement are the building. Both are required.
If you need help implementing or troubleshooting SPF, DKIM, and DMARC across multiple sending domains and third-party tools, book a consultation. I configure authentication stacks for senders ranging from 50K to 10M+ emails/month.
Sources
- RFC 7208: Sender Policy Framework (SPF)
- RFC 6376: DomainKeys Identified Mail (DKIM)
- RFC 7489: DMARC specification
- Google: SPF DKIM DMARC overview
- Microsoft: SPF DKIM DMARC overview official documentation
v1.0 · May 2026
Frequently Asked Questions
How to authenticate your email with SPF, DKIM, and DMARC?
Publish three DNS records: an SPF TXT record listing your authorized senders, a DKIM TXT record (or CNAME) containing your public signing key, and a DMARC TXT record at _dmarc.yourdomain.com defining your policy. Verify each via mail-tester.com or MXToolbox. Start DMARC at p=none, advance to p=quarantine then p=reject after monitoring reports.
What's the difference between DMARC vs DKIM?
DKIM signs messages with a cryptographic key proving the message hasn't been altered and came from the claimed domain. DMARC is a policy layer on top that ties DKIM (and SPF) results to the visible From: address and instructs receivers what to do with failures. DMARC requires DKIM (or SPF) to work; DKIM works without DMARC but provides less protection.
Do DMARC and DKIM work together?
Yes — DMARC depends on DKIM (or SPF) to function. DMARC checks whether DKIM signature and SPF result align with the From: header domain. Strong DMARC requires at least one of them to align. Most senders configure both DKIM and SPF for redundancy: if one fails (e.g., SPF breaks on forwarding), the other can carry DMARC.
What does DMARC SPF alignment mean?
DMARC SPF alignment means the domain in the SPF check (envelope From / Return-Path) matches the domain in the visible From: header. SPF alone doesn't check the visible From: — DMARC adds that check. Without alignment, an attacker can pass SPF using their own domain while spoofing your From: address.
What's the difference between SPF and DKIM records?
SPF records list authorized sending IP addresses; DKIM records contain a public cryptographic key used to verify signed messages. SPF travels in DNS only — sending servers don't add anything to the message. DKIM signs each message with a header. Both are published in your DNS but serve different purposes.
Want this handled for you?
Free 30-minute strategy call. Walk away with a plan either way.