February 4, 2026 10 min read

What Is the Difference Between SPF, DKIM, and DMARC?

SPF specifies which servers can send email for your domain. DKIM adds a cryptographic signature proving the message is authentic and unaltered. DMARC ties them together with a policy that tells receivers what to do when authentication fails. All three are required for bulk senders to Gmail, Yahoo, and Microsoft.

Email authentication uses three protocols working together. Each solves a different problem, and all three are necessary for complete protection. Understanding how they differ helps you implement them correctly.

Quick Comparison

Protocol What It Does Where It Lives What It Checks
SPF Authorizes sending servers DNS TXT record at domain root Sending IP address
DKIM Signs messages cryptographically DNS TXT record + email header Message integrity
DMARC Sets policy for failures DNS TXT record at _dmarc subdomain SPF/DKIM alignment

SPF: Authorizing Sending Servers

SPF (Sender Policy Framework) answers one question: Is this server allowed to send email for this domain?

You publish a list of authorized IP addresses in your DNS. When a receiving server gets an email claiming to be from your domain, it checks whether the sending IP appears in your SPF record.

What SPF Checks

What SPF Does Not Do

DKIM: Proving Message Authenticity

DKIM (DomainKeys Identified Mail) proves that the message content is authentic and unchanged.

Your mail server adds a cryptographic signature to each message using a private key. The corresponding public key is published in DNS. Receivers can verify the signature to confirm the message was authorized and has not been altered.

What DKIM Checks

What DKIM Does Not Do

DMARC: Policy and Reporting

DMARC (Domain-based Message Authentication, Reporting and Conformance) solves two problems that SPF and DKIM leave open:

  1. Policy: What should receivers do when authentication fails?
  2. Alignment: Does the authenticated domain match the visible From address?

DMARC requires that at least one of SPF or DKIM passes AND aligns with the From header domain. This prevents attackers from passing SPF or DKIM with their own domains while spoofing yours in the From address.

What DMARC Adds

How They Work Together

Consider this scenario: You send an email from your marketing platform.

  1. SPF Check: The receiving server looks up your SPF record and verifies the marketing platform's IP is authorized. SPF passes.
  2. DKIM Check: The server finds your DKIM signature, retrieves your public key from DNS, and verifies the signature is valid. DKIM passes.
  3. DMARC Check: The server confirms that either the SPF domain or DKIM signing domain aligns with the From header. Since both pass and align, DMARC passes.

If any check fails or alignment is missing, DMARC applies your published policy.

Why All Three Matter

SPF alone can be bypassed by spoofing the visible From address. DKIM alone can break when messages are forwarded. DMARC ties them together and adds the alignment check that makes the authentication meaningful to recipients.

Requirements for Bulk Senders

Gmail, Yahoo, and Microsoft now require all three protocols for bulk senders:

Provider SPF DKIM DMARC
Gmail (5,000+/day) Required Required Required (p=none minimum)
Yahoo (bulk senders) Required Required Required (p=none minimum)
Microsoft (high volume) Required Required Required

Implementation Order

If you are starting from scratch, implement in this order:

  1. SPF first: Identify all sending sources and publish your SPF record
  2. DKIM second: Configure signing for all sending sources and publish public keys
  3. DMARC last: Start with p=none to monitor, then tighten policy over time

This order matters because DMARC depends on SPF and DKIM being configured correctly. Implementing DMARC before fixing authentication issues causes legitimate mail to fail.

Common Misunderstandings

"SPF checks the From address"

SPF checks the Return-Path (envelope sender), not the visible From address. These are often different, especially when using third-party sending services.

"DKIM prevents email modification"

DKIM detects modification but does not prevent it. If a message is modified after signing (by a mailing list, for example), the signature becomes invalid.

"DMARC replaces SPF and DKIM"

DMARC depends on SPF and DKIM. It adds policy and alignment checking but does not replace the underlying authentication protocols.

"p=none means DMARC is not working"

p=none is a valid DMARC policy that enables reporting without affecting delivery. It is the required starting point for safe DMARC implementation.

Frequently Asked Questions

Do I need all three protocols?
Yes, for bulk senders to Gmail, Yahoo, and Microsoft. All three are required. Even for smaller senders, implementing all three significantly improves deliverability and protects your domain from spoofing.
Which is most important?
They work together as a system. DMARC is often considered most important because it ties SPF and DKIM together with alignment and policy. However, DMARC cannot function without SPF and DKIM in place.
Can I pass DMARC with just SPF or just DKIM?
Yes, DMARC requires only one aligned authentication method to pass. However, having both SPF and DKIM provides redundancy. If one fails (DKIM can break with forwarding), the other can still pass DMARC.
What happens if I only have SPF?
Without DKIM and DMARC, SPF provides limited protection. Attackers can still spoof your visible From address. Bulk senders to major providers will face delivery issues without all three protocols.

Ready to Improve Your Email Deliverability?

SortedIQ helps high-volume senders maximize inbox placement and sender reputation.

Talk to Our Team