February 9, 20269 min read

What Is ARC (Authenticated Received Chain)?

ARC (Authenticated Received Chain) is an email authentication protocol that preserves SPF, DKIM, and DMARC results when messages pass through intermediaries like mailing lists or forwarding services. ARC allows receiving servers to see the original authentication status before modifications that would otherwise break DKIM signatures and cause DMARC failures.

The Problem ARC Solves

Email forwarding and mailing lists break traditional authentication:

Without ARC

  1. You send email to a mailing list (DKIM passes, SPF passes)
  2. Mailing list modifies the message (adds footer, changes subject)
  3. DKIM signature breaks because content changed
  4. SPF fails because mailing list server is not in your SPF
  5. DMARC fails, email goes to spam or is rejected

With ARC

  1. You send email to a mailing list (DKIM passes, SPF passes)
  2. Mailing list records original authentication results in ARC headers
  3. Mailing list modifies message and adds its own DKIM signature
  4. Final receiver sees ARC chain showing original authentication passed
  5. Receiver can trust the ARC chain and deliver despite DMARC failure

Chain of Custody

ARC creates a "chain of custody" for authentication. Each intermediary adds a link to the chain, sealing the previous authentication results. The final receiver sees the complete history.

How ARC Works

ARC Headers

ARC adds three headers at each hop:

Instance Numbers

Each set of ARC headers includes an instance number (i=1, i=2, etc.). This tracks the order of intermediaries the message passed through.

Chain Validation

The receiving server validates the ARC chain by:

  1. Checking each ARC-Seal signature
  2. Verifying chain integrity from first to last instance
  3. Evaluating the original authentication results
  4. Deciding whether to trust the chain

Common ARC Scenarios

Mailing Lists

Mailing lists often add footers or modify subjects, breaking DKIM. ARC allows the original authentication to be preserved through the list processor.

Email Forwarding

When users forward their email to another account (personal to work), SPF fails because the forwarding server is not authorized. ARC preserves the original SPF result.

Security Gateways

Corporate email security gateways that modify messages can use ARC to preserve original authentication before their modifications.

ARC Support

Who Evaluates ARC

Major receivers that consider ARC in DMARC decisions:

These providers may deliver email that failed DMARC if a trusted ARC chain shows original authentication passed.

Who Adds ARC

Intermediaries that commonly add ARC headers:

ARC and DMARC Policy

ARC does not override DMARC. Instead, receivers use ARC to make more informed decisions:

Trusted Sealers

Receivers maintain lists of trusted ARC sealers. They are more likely to honor ARC from known, reputable intermediaries than from unknown ones.

For Senders: What You Need to Know

You Do Not Implement ARC

As a sender, you do not add ARC headers. ARC is added by intermediaries (mailing lists, forwarders) and evaluated by receivers.

Your Responsibility

DMARC Reports

DMARC aggregate reports show failures that may be legitimate forwarding. High failure rates from certain sources (mailing lists) are expected and not necessarily concerning.

Frequently Asked Questions

Do I need to set up ARC for my domain?
No. ARC is implemented by intermediaries (mailing lists, forwarders) not senders. You implement SPF, DKIM, and DMARC; intermediaries implement ARC when they forward your email.
Does ARC guarantee delivery of forwarded email?
No. Receivers decide whether to trust ARC chains. They may not trust all ARC sealers equally. ARC improves the chances but does not guarantee delivery.
Why do I see DMARC failures in reports for mailing list email?
Mailing lists modify messages, breaking DKIM and SPF. These show as DMARC failures in reports. Many may still be delivered if ARC preserved the original authentication and the receiver trusts the ARC chain.
Should I adjust my DMARC policy because of forwarding failures?
Not necessarily. Some forwarding failures are expected. Staying at p=quarantine or p=reject is still recommended. Legitimate forwarding with ARC should still work; failures are often actual spoofing attempts.

Understand Your Email Authentication

SortedIQ helps senders navigate complex authentication scenarios and DMARC implementation.

Talk to Our Team