SPF, DKIM, and DMARC Explained (Without the Jargon)
These three acronyms are the guardians of your inbox. They're the reason some fake emails get blocked while others slip through. Let's break them down in plain English.
Quick Definitions
- SPF (Sender Policy Framework) - Lists which servers are allowed to send email for a domain
- DKIM (DomainKeys Identified Mail) - Adds a digital signature to prove the email wasn't altered
- DMARC (Domain-based Message Authentication) - Tells recipients what to do when SPF/DKIM fail
- All three together prevent email spoofing and protect your brand from impersonation
- Domains without these can be spoofed by anyone - check yours with TrustNope
Sender Policy Framework
The Guest List
What it does:
SPF is like a guest list for a party. The domain owner publishes a list of IP addresses (computers) that are allowed to send email on their behalf.
How it works:
- 1. You receive an email claiming to be from "company.com"
- 2. Your email provider checks: "Does company.com have an SPF record?"
- 3. If yes, it checks: "Is the sending server on the approved list?"
- 4. If not on the list, the email might be fake
Limitations:
SPF only checks the "envelope sender" (technical sending address), not the "From" address you see. So a scammer could still show a fake "From" address even if SPF passes.
DomainKeys Identified Mail
The Wax Seal
What it does:
DKIM is like a wax seal on a medieval letter. The sender's server adds a digital signature to the email. If anyone tampers with the content, the seal breaks.
How it works:
- 1. The sending server signs the email with a private key
- 2. The signature is added to the email header
- 3. Receiving servers use a public key (from DNS) to verify the signature
- 4. If verification fails, the email was modified or forged
Limitations:
DKIM uses "selectors" - unique identifiers for each signing key. Without knowing the selector, it's hard to check for DKIM. That's why DMARC is important.
Domain-based Message Authentication
The Enforcer
What it does:
DMARC ties everything together. It tells email providers: "Here's how to check if emails from my domain are legitimate, and here's what to do with fake ones."
How it works:
- 1. The domain owner publishes a DMARC policy
- 2. The policy says: "Check SPF and/or DKIM"
- 3. If checks fail, the policy says what to do: none (report only), quarantine (send to spam), or reject (block completely)
The key insight:
A domain with DMARC policy set to "reject" is saying: "Block any email from my domain that fails authentication." This is the strongest protection against spoofing.
How They Work Together
Think of it like airport security:
- SPF ID Check: "Are you on the authorized personnel list for this airline?"
- DKIM Credential Verification: "Is your badge authentic and unaltered?"
- DMARC Policy Enforcement: "What do we do if someone fails these checks? Let them through with a warning, detain for questioning, or arrest immediately?"
What TrustNope Checks
When you enter a domain in TrustNope, we look up its DNS records and check:
SPF Record
Is there an SPF record? Is it valid?
DKIM (Common Selectors)
We check popular selectors like "google", "default", "selector1"
DMARC Policy
Is there a DMARC record? What's the policy (none/quarantine/reject)?
Based on these checks, we give you a verdict:
- Trust Strong authentication in place - spoofing is difficult
- Caution Partial authentication - some protection but gaps exist
- Nope Little or no authentication - easy to spoof
The Bottom Line
SPF, DKIM, and DMARC are the email world's security trio. When all three are properly configured, they make it very hard for scammers to send emails pretending to be from that domain.
TrustNope translates these technical checks into simple verdicts you can act on. No need to understand DNS or parse TXT records - just enter a domain and see if it's trustworthy.
Ready to Check a Domain?
TrustNope's domain checker is coming soon. In the meantime, learn more about email safety.
7 Ways to Spot Phishing