Skip to main content
Email Ferret Logo
Email Ferret
FeaturesPricingBlogTemplatesGuides
Get Started
Back to Guides
April 10, 2026
11 min read
Email Ferret Team

DMARC, SPF, and DKIM Explained: Email Authentication for Everyone

What DMARC, SPF, and DKIM actually do in plain English. Why Gmail now requires all three, how to check if emails you receive are authenticated, and what authentication can't protect you from.

DMARC, SPF, and DKIM Explained: Email Authentication for Everyone

Introduction

Email authentication sounds like something only IT departments need to care about. DNS records, cryptographic signatures, policy frameworks - the terminology is dense enough to make most people's eyes glaze over. But the underlying concepts are simple, the stakes are real, and understanding them takes about ten minutes.

This guide explains what SPF, DKIM, and DMARC actually do - in plain English, with analogies, without assuming you know what a DNS record is. We'll cover why these protocols matter more than ever after Gmail's November 2025 enforcement change, how to check whether an email you received is properly authenticated, and - critically - what authentication cannot protect you from.

That last point is where most explanations fall short. Authentication is a powerful tool against spoofing and phishing. But it has a hard limit: it verifies identity, not intent. Understanding where that limit sits is the most useful thing you can take away from this guide.

What Is SPF (Sender Policy Framework)?

Think of SPF as a guest list for email servers. When a company sends email, their domain's guest list - published in a DNS record - specifies exactly which mail servers are authorized to send on their behalf.

Here's how DNS records fit into this. DNS (Domain Name System) is essentially the internet's phone book. When you type a website address, your browser looks up that address in DNS to find the corresponding server. Domains can also publish other types of information in DNS - including their SPF policy. Any mail server in the world can look up that policy and check whether an incoming email followed the rules.

When you receive an email claiming to be from newsletter@company.com, the receiving mail server (Gmail, in most cases) does the following: it looks up the DNS record for company.com, finds the SPF entry, and checks whether the server that actually sent the email is on the authorized list. If the sending server is on the list, SPF passes. If it's not on the list, SPF fails.

This is straightforward and effective - it stops attackers from using random servers to impersonate your domain. If someone tries to send a phishing email that pretends to come from paypal.com using a server they control, SPF fails because that server isn't on PayPal's authorized list.

The limitation of SPF: It only checks whether the sending server is authorized. It says nothing about the content of the email, whether it's wanted, or whether it was generated by a human or a machine. A spam campaign run through an authorized server passes SPF just fine.

What Is DKIM (DomainKeys Identified Mail)?

If SPF is the guest list, DKIM is the tamper-evident seal on an envelope. It proves that the email you received is exactly the email that was sent - nothing was changed in transit.

Here's how it works. When your mail server sends an email, it adds a cryptographic signature to the email's headers. Think of this as a digital fingerprint of the email's contents, created using a private key that only your mail server knows. The corresponding public key - the lock that only that fingerprint can open - is published in your domain's DNS records.

When the receiving server gets the email, it fetches your public key from DNS and uses it to verify the signature. If the email's content matches the signature, DKIM passes. If anything was altered in transit - even a single character changed - the signature no longer matches and DKIM fails.

This protects against a class of attack called "man-in-the-middle" interception, where an attacker intercepts an email and modifies it before it reaches the recipient. Without DKIM, an attacker could intercept a payment confirmation and change the bank account number. With DKIM, any alteration breaks the signature and the receiving server knows the email was tampered with.

The limitation of DKIM: Like SPF, DKIM verifies integrity, not intent. It confirms that the email arrived exactly as sent and that it genuinely comes from the claimed domain. It doesn't evaluate whether the email is welcome, useful, or honest in its purpose.

What Is DMARC?

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is the policy layer that ties SPF and DKIM together. On its own, a failed SPF or DKIM check doesn't necessarily do anything - the email might still be delivered. DMARC is what tells the receiving server what to actually do when checks fail.

A DMARC policy is published as another DNS record and specifies one of three enforcement levels:

  • None (p=none): Monitor mode. Authentication failures are logged and reported, but emails are still delivered. Used by domain owners who want visibility without risk.
  • Quarantine (p=quarantine): Suspicious emails go to the spam or junk folder. A middle-ground enforcement that catches failures without outright rejection.
  • Reject (p=reject): Emails that fail authentication are rejected at the server level - they never reach the recipient's inbox or spam folder. The strictest and most protective level.

DMARC also introduces a critical concept called alignment. It's not enough for an email to pass SPF or DKIM checks in isolation - the domain in those checks must align with the domain in the visible "From" address. This closes a loophole where attackers could pass technical checks using a different domain while showing recipients a spoofed sender address.

Finally, DMARC enables reporting. Receiving mail servers send aggregate reports back to domain owners, showing how many emails passed and failed authentication and from what sources. This is invaluable for diagnosing legitimate email flows that might be misconfigured.

The Authentication Trinity: A Simple Analogy

Think of the three protocols as a venue security system. SPF is the guest list - it checks whether the messenger is authorized to deliver mail on behalf of the domain. DKIM is the tamper seal - it verifies the message wasn't opened and modified in transit. DMARC is the head of security - it decides what happens when either check fails and makes sure the person at the door matches the name on the invite.

Why Gmail Now Requires All Three

For most of email's history, authentication was optional. Domains that implemented SPF, DKIM, and DMARC got better deliverability. Domains that skipped them might still get their emails delivered, with perhaps a warning banner or a higher likelihood of hitting spam.

That changed in November 2025. Gmail shifted from a recommendation to enforcement - moving from warnings and spam-folder routing to outright SMTP-level rejection for emails that fail authentication. This is the most significant change to email infrastructure in over a decade. (For the full picture of what this means for senders and recipients, see our detailed analysis in The 2026 Email Authentication Crisis.)

What does SMTP-level rejection mean in practice? It means that when a non-compliant email arrives at Gmail's servers, Gmail sends back a rejection code before the email is even delivered. The email never touches your inbox, spam folder, or anywhere else in Gmail. To the sender, it appears as though you simply don't exist. You have no way of knowing someone tried to contact you.

Gmail's current requirements for all senders include:

  • Valid SPF record that authorizes the sending server
  • DKIM signature on every outgoing email
  • DMARC record at minimum p=none (monitor mode)
  • Valid PTR records - reverse DNS entries that map the sending IP address back to a hostname
  • TLS encryption - all email must be sent over an encrypted connection
  • Spam complaint rates below 0.10% - Gmail measures how often recipients mark emails as spam

Bulk senders (those sending more than 5,000 emails per day to Gmail addresses) face additional requirements: one-click unsubscribe must be functional within two days, and complaint thresholds are enforced more strictly.

The adoption gap is striking. Only 7.6% of domains fully enforce DMARC at the reject level, leaving the vast majority of internet domains either partially protected or completely exposed. Meanwhile, cold outreach platforms - services like Instantly, Apollo, and Smartlead - configure authentication perfectly from day one as a matter of business necessity. The irony is sharp: the emails most likely to be wanted are the ones most likely to fail authentication. The emails least wanted are the ones most likely to pass.

DMARC-authenticated domains are 2.7x more likely to reach the inbox compared to unauthenticated sending. This creates a strong incentive for any organization sending email to get all three protocols configured correctly.

How to Check If an Email You Received Is Authenticated

Gmail exposes authentication results for every email, but they're tucked away in the raw message headers rather than shown in the main interface. Here's how to find them:

  1. Open the email in Gmail
  2. Click the three-dot menu in the top-right corner of the email (next to the reply button)
  3. Select "Show original" from the dropdown menu
  4. A new tab opens showing the raw message headers
  5. Look near the top for lines beginning with Authentication-Results:

You'll see entries for SPF, DKIM, and DMARC, each followed by a result. Here's what the results mean:

  • PASS - The check succeeded. The email's authentication is valid for this protocol.
  • FAIL - The check failed. The email's authentication is invalid, which could indicate spoofing or misconfiguration.
  • SOFTFAIL - A partial failure. For SPF, this means the sending server isn't explicitly authorized but the domain hasn't issued a hard rejection either. Often indicates misconfiguration rather than spoofing.
  • NONE - No record was found. The domain hasn't published a policy for this protocol.
  • NEUTRAL - The domain has an SPF record but explicitly states it makes no assertion about the server.

What should raise a red flag: If you receive an email claiming to be from a major company - a bank, a payment processor, a well-known software company - and the SPF or DKIM result shows FAIL, treat the email with significant skepticism. Large, established organizations should have flawless authentication configuration. A FAIL from paypal.com or amazon.com is a strong indicator of a spoofing attempt.

Quick Check for Suspicious Emails

If you receive an email that asks you to take action - clicking a link, entering credentials, transferring money - use "Show original" to check the authentication results before doing anything. A PASS from a recognized domain doesn't guarantee the email is legitimate, but a FAIL from a well-known domain is a strong warning sign that something is wrong.

What Authentication Cannot Do

This is the most important section of this guide, and the one that most explanations skip.

Email authentication answers one question: Is this email actually from the domain it claims to be from? That's a meaningful question with a clear answer. But it's not the question your inbox really needs answered, which is: Do I want this email?

Authentication verifies identity. It says nothing whatsoever about intent.

Consider what this means in practice. A BDR (Business Development Representative) at a software company wants to send you a cold sales pitch. They're using Instantly, a dedicated cold outreach platform. Instantly automatically configures SPF, DKIM, and DMARC records for their sending domain. The email passes all three authentication checks with flying colors. Gmail sees a properly authenticated email from a real domain with a clean reputation. The email lands in your primary inbox.

Is the email wanted? Almost certainly not - you've never heard of this company, you didn't request contact, and the email is one of 5,000 nearly identical messages sent to a purchased prospect list. But authentication has no way to know that. Authentication confirms that the email is genuinely from the domain it claims. It doesn't know whether you want it.

This isn't a flaw in the authentication system - it's simply not what authentication was designed to do. Authentication was designed to prevent spoofing: attackers pretending to be someone they're not. It does that job well. But the dominant form of inbox clutter in 2026 isn't spoofing. It's sophisticated, properly authenticated cold outreach at industrial scale.

The inbox warming dimension makes this sharper. Cold outreach platforms don't just configure authentication correctly - they also spend weeks manufacturing a clean sender reputation before launching campaigns. Networks of automated email accounts open, reply to, and remove-from-spam the cold outreach emails during the warm-up phase. This builds an engagement history that Gmail interprets as a trust signal. By the time you receive your first email from a new sender, their domain may have an artificially polished reputation alongside perfect authentication.

The result: an email that passes every technical check Gmail enforces, arrives from a domain with a strong reputation, and contains a personalized sales pitch you never asked for.

The Authentication Gap

SPF, DKIM, and DMARC are powerful tools against phishing and spoofing from fake domains. They are completely ineffective against cold outreach from real domains. The same infrastructure protections that block impersonation attacks also legitimize the AI-generated sales emails that bypass every other filter. Authentication and inbox control are two different problems.

Authentication is a floor, not a ceiling. It eliminates the worst-case scenario - email that's outright fraudulent - but it doesn't address the vast gray area of technically legitimate but deeply unwanted email. For that, you need a different layer of analysis entirely.

How Email Ferret Uses Authentication Signals

Email Ferret treats authentication as one signal among many - valuable context, but not the whole picture.

When an email arrives, authentication results are part of the initial evaluation. An email from an unknown sender that also fails DKIM gets scored differently than an email from an unknown sender with perfect authentication. But authentication alone - whether passing or failing - doesn't determine the outcome. A cold outreach email with flawless authentication still gets detected through other signals. A legitimate email from a small vendor with a misconfigured SPF record doesn't get flagged as spam based on that alone.

The signals that authentication can't surface are where Email Ferret focuses most of its analysis. These include BDR phrase patterns - the specific language that sales outreach consistently uses, from "quick question" openers to calendar-booking calls to action. Automation tool fingerprints - technical markers in email headers that identify when an email was sent through Instantly, Apollo, Smartlead, or similar platforms. Thread context - whether this email initiates a fresh conversation or continues an existing exchange. Domain trust history - not just whether a domain is authenticated, but how old it is, what its sending pattern looks like, and whether it appears in cold outreach infrastructure databases.

This multi-signal approach produces what authentication-only analysis can't: a distinction between an email that's technically from who it claims to be from, and an email that you actually want in your inbox. Transparent scoring shows exactly which signals triggered detection for any given email, so you can see the reasoning rather than just accept a verdict. When authentication signals do contribute to the score - either positively as a trust indicator or negatively as an anomaly - they're visible in the breakdown alongside everything else.

The practical outcome is an inbox where phishing and spoofing are blocked by authentication enforcement (Gmail's layer), and AI-generated cold outreach is caught by behavioral analysis (Email Ferret's layer). Neither approach replaces the other. They address fundamentally different problems.

Start Protecting Your Inbox

Authentication enforcement blocks spoofed emails, but it can't touch the AI-generated cold outreach that passes every technical check. Email Ferret uses 15+ behavioral signals to detect what authentication misses. Try Email Ferret free for 14 days - no credit card required.

Get Started Free
Share this article

Related Articles

March 13, 2026

Gmail Filter Words List: 100 Keywords (and How to Avoid False Positives)

Keyword-based Gmail filters can catch unwanted emails, but they're risky. Learn 100 common filter keywords and how to avoid false positives.

Read more
March 11, 2026

VIP Email List: How to Build a "Never Miss" System in Gmail

A VIP email list ensures you never miss important emails. Learn why most VIP lists fail and how to build effective rules and alerts.

Read more
March 05, 2026

Allowlist + Blocklist: The 15‑Minute Setup That Reduces Inbox Noise Fast

Email allowlist and blocklist setup is the foundation of effective email filtering. Learn how to build and maintain them in Gmail to reduce inbox noise.

Read more

Explore Email Ferret

Gmail Spam FilterEmail Ferret vs SaneBoxGmail Inbox Organization

Get Started Free

Stop wasting time on spam and AI-generated cold outreach.

Get Started Free
Email Ferret Logo
Email Ferret

AI-powered inbox defense

Stop AI-generated sales emails from cluttering your Gmail. Email Ferret catches the cold outreach that Gmail misses—automatically.

Product

  • Features
  • How It Works
  • Pricing
  • Reviews
  • Get Started

Solutions

  • Gmail Spam Filter
  • Block Cold Emails
  • AI Spam Detection
  • Stop Sales Emails

Use Cases

  • All Use Cases
  • For Executives
  • For Founders
  • For Recruiters
  • For Engineers
  • For Sales Teams
  • For Lawyers

Compare

  • All Comparisons
  • vs SaneBox
  • vs Superhuman
  • vs Clean Email
  • vs HEY
  • vs alfred_

Resources

  • Email Reports
  • Guides
  • Templates
  • Blog
  • Alternatives
  • Glossary
  • About
  • Security

Support

  • support@emailferret.io
  • Contact Form
SSL Secured
GDPR Compliant
Secure Billing
Secure Payments
© 2026 Email Ferret. All rights reserved.
SecurityPrivacyTermsMade with ❤️ for a cleaner inbox