Wednesday, April 9, 2025

Why DMARC Matters: How Modern Email Platforms Enforce It to Stop Spoofing

Email remains the #1 channel attackers abuse for phishing, impersonation and fraud. The industry-standard defence is the trio of SPF, DKIM and DMARC. Domain owners publish the policy, but here’s the crucial bit:

The responsibility for enforcing DMARC sits with the receiving mail servers—and the major cloud platforms already honour DMARC out of the box.

Who Actually Enforces DMARC?

Publishing a DMARC record doesn’t block spoofing on its own. DMARC works when the recipient’s mail system checks and enforces it. That’s exactly what the dominant email platforms do today:

Receiving Platform DMARC Enforcement Notes
Microsoft 365 (Exchange Online) ✅ Enabled by default Built-in SPF, DKIM and DMARC validation on ingress
Google Workspace (Gmail) ✅ Fully enforced Strict SPF/DKIM checks with DMARC policy honouring
Yahoo / AOL (Verizon Media) ✅ Enforced aggressively Early DMARC adopters; strong stance against spoofing
Apple iCloud Mail ✅ DMARC-aware Treats failing DMARC messages as suspicious
Secure Email Gateways (Mimecast, Proofpoint, Cisco, etc.) ✅ Standards-compliant DMARC checks are table stakes for modern gateways

Practical takeaway: Because most business and consumer mail is received by these platforms, the vast majority of inboxes already enforce your DMARC policy.

Adoption at Scale: Microsoft 365, Google Workspace & Co.

  • Microsoft 365 serves hundreds of millions of commercial mailboxes globally. Exchange Online validates SPF/DKIM and enforces DMARC policies by default.
  • Google Workspace / Gmail powers more than a billion consumer mailboxes and millions of businesses; DMARC is first-class and strictly applied.
  • Other majors (Yahoo/AOL, Apple, Outlook.com) and leading email security providers also honour DMARC by default.

In short, if your organisation emails customers, partners or staff using mainstream providers, your published DMARC policy is being read and enforced at the other end.

What About Legacy or Unpatched On-Prem Mail Servers?

Some legacy on-premises MTAs (e.g. very old Exchange versions or unmaintained open-source stacks) may not fully validate DMARC. However, if a server is so old it can’t honour DMARC, it almost certainly has a long list of other security vulnerabilities—missing patches, weak TLS, outdated auth, and limited phishing controls. These environments are now the exception, not the norm, and most are fronted by secure gateways that do enforce DMARC.

Stopping Spoofing: SPF + DKIM + DMARC

  • SPF: Verifies the sending IP is authorised for the domain.
  • DKIM: Cryptographically signs the message to prove integrity and domain control.
  • DMARC: Ties it together—requires alignment and tells receivers what to do on failure (none, quarantine, reject).

Together, these form the industry solution for eliminating direct domain spoofing across modern inboxes.

Stronger Enforcement in the Last 12–18 Months

Major receivers have tightened the screws:

  • Google & Yahoo: Tougher requirements for bulk senders; unauthenticated mail is throttled, spam-foldered, or rejected.
  • Microsoft: Increased scrutiny and filtering of non-aligned, non-authenticated messages that attempt domain impersonation.
  • All majors: Ongoing nudges towards proper SPF/DKIM/DMARC hygiene, improving safety across the ecosystem.

What This Means for You

  • Publish DMARC and aim for p=quarantine or p=reject once you’ve validated legitimate senders.
  • Authenticate everything (marketing platforms, CRMs, ticketing tools, finance systems) with SPF and DKIM, aligned to your primary domain or subdomains.
  • Monitor reports (DMARC RUA) to see who’s sending with your domain and fix gaps before enforcing.

Because receivers already honour DMARC, setting a strong policy immediately reduces successful spoofing against your brand.

Bottom Line

DMARC isn’t just a DNS record—it’s a powerful instruction that modern mail platforms follow by default. In a world dominated by Microsoft 365, Google Workspace and leading security gateways, SPF + DKIM + DMARC is the proven, widely enforced way to stop direct domain spoofing and protect trust.


Tip: If you’re still migrating from legacy systems, put a secure email gateway in front—or accelerate your move to cloud email—to ensure DMARC is fully enforced on inbound mail.

Thursday, April 3, 2025

Why SPF Soft‑Fail (~all) Is the Smarter Choice for Deliverability

When you publish an SPF record with a hard‑fail (-all), you’re telling every receiver to reject mail from any IP not explicitly authorised. It sounds secure—but it can do more harm than good. In many real‑world scenarios, a soft‑fail (~all) policy delivers the same security under DMARC while avoiding collateral damage to legitimate mail flows. Here’s why staying in soft‑fail often makes the most sense.

1. SPF’s Bypass Vulnerability

SPF checks only the envelope sender (MAIL FROM), not the visible “From:” header. An attacker can exploit this by using a domain they control in the envelope, yet spoof your brand in the header—completely bypassing SPF’s intended protection. DMARC addresses this gap by requiring alignment, but it underscores that SPF alone is never a standalone defence.

2. Under DMARC, “Hard” = “Soft”

Once DMARC is active, any SPF result aside from an aligned “pass” will break SPF alignment—whether it’s -all, ~all or ?all. The receiving system then defers to DKIM or DMARC’s own policy (none, quarantine, reject). In practice, hard‑fail offers no extra benefit under DMARC.

3. The Relaying (Forwarding) Problem

Legitimate forwarding or relaying services—common in multi‑domain setups—break SPF. A forwarded email often arrives from an IP not listed in your SPF, triggering a hard‑fail. With -all, that message is bounced before DKIM or DMARC can save it. Soft‑fail, however, allows the mail through for full authentication checks, ensuring genuine mail survives forwarding.

4. RFC‑Mandated Caution on Early Rejection

The DMARC specification warns that a hard‑fail may cause some receivers to reject mail before DMARC and DKIM can be evaluated. You could lose perfectly legitimate, DKIM‑signed messages simply because SPF blocked them too early.

5. Domain Reputation Isn’t Improved by -all

There’s no evidence that hard‑fail boosts your sending reputation—any “reputation” gain from blocking illegitimate mail is outweighed by the spikes in bounces and NDRs you’ll generate. Soft‑fail avoids those bounces, keeps your bounce rate in check, and still provides the same DMARC‑driven security.

6. Recommended Email Hardening Workflow

  1. Publish SPF with ~all to collect data without breaking flows.
  2. Deploy DMARC (start with p=none), review reports to identify missing senders.
  3. Enable DKIM signing for all legitimate sources and ensure alignment.
  4. Tighten DMARC to quarantine or reject once DKIM coverage is 100%.
  5. (Optional) Switch SPF to -all only if you’re absolutely certain no valid mail will break alignment.

7. When -all Still Makes Sense

For domains that should never send email—such as parked domains or inbound‑only mailboxes—a hard‑fail SPF aligned with a DMARC p=reject policy is appropriate. But for active sending domains, soft‑fail maximises deliverability without compromising DMARC‑backed security.

Conclusion

SPF hard‑fail is a relic from a pre‑DMARC era. Today, with DMARC and DKIM doing the heavy lifting, soft‑fail (~all) gives you the best of both worlds: visibility into unauthorised flows, robust protection against spoofing, and minimal risk of blocking legitimate mail. Start soft, monitor closely, then only tighten when you’ve seen every source through the lens of DKIM and DMARC.

Stop Bypassing DMARC: A Supply Chain Reality Check

Stop Bypassing DMARC: A Supply Chain Reality Check DMARC isn’t the problem—how we respond to failed authenti...