Email Authentication: Expert Tips for SPF, DKIM, DMARC, and Beyond
Email authentication is now a requirement for businesses and mass email senders. As of February 2024, Google and Yahoo mandate protocols like DMARC, while Microsoft joined the movement shortly after.
We hosted a webinar on email authentication to help familiarize email senders with the topic. Watch the video below as ZeroBounce COO Brian Minick explains how to authenticate emails.
What is email authentication?
Email authentication is a set of protocols verifying that an email sent from your domain is legitimate. Email authentication tools protect your domain from spoofing and fraud and also tell email service providers – like Google and Yahoo – whether you sent an email or if someone is a fraudulent sender.
Email authentication protocols & why they matter
If you want to know how to authenticate email, you need to familiarize yourself with the various email authentication protocols.
Sender Policy Framework (SPF) – verifying authorized senders
SPF is a DNS record that lists all authorized mail servers for a given domain. Whenever someone sends an email from your domain, the recipient service provider will check your SPF record and attempt to match the sender’s IP address to confirm its legitimacy.
When you sign up for a service like Mailchimp or Constant Contact, it provides you with SPF records during the initial setup. However, this setup can be tricky if you use multiple platforms.
For example, a company may use Constant Contact for their main newsletter and Klaviyo for automation. Instead of creating different SPF records, you need to implement a combined one to account for all sending services.
How SPF works (step-by-step explanation)
This is how an SPF email authentication check takes place in real time:
- An email is sent from an IP → The recipient’s server looks up the sending IP address in the SPF record.
- If the sender’s IP address is listed in the SPF record → SPF passes. If not → SPF fails.
- If an email fails the SPF check, the recipient server will consult the listed DMARC record (if available). This can prompt the recipient to reject or quarantine suspicious emails.
Here’s an example of an SPF record:
v=spf1 include:_spf.google.com ~all
And here’s a breakdown of SPF syntax:
- v = spf1 – This tells the recipient that this is an SPF record.
- include: _spf.google.com – This tells the recipient to check the SPF record for IP addresses authorized to send from the described domain.
- ~all –This is one possible SPF mechanism. ‘~all’ tells the recipient only to allow mail from IPs listed in the SPF record.
Other possible mechanisms include:
- -all – Indicates that the domain doesn’t send any outbound mail.
- +all – Allows any IP address to send mail from the domain.
There are additional ways to configure your SPF record, including:
- Listing only a range of IPv4 or IPv6 addresses
- Checking A or MX records
Common SPF mistakes & fixes
If you run into issues with your SPF record, check it for these common errors:
- Syntax