Why is DMARC failing on my .fr domain despite passing SPF and DKIM?

Summary

Experts, documentation, and email marketers agree that DMARC failures, even with passing SPF and DKIM, are primarily due to alignment issues. Alignment means the domain used for SPF or DKIM authentication must match the domain in the 'From' header. DMARC acts as a policy layer on top of SPF and DKIM, and it's designed to prevent phishing and spam. Other potential issues include email forwarding and incorrect subdomain reporting. While less common, problems with body hashing can also cause signature failures.

Key findings

  • Alignment is the Top Reason: Lack of alignment between the authenticated domain (SPF or DKIM) and the 'From' domain is the most common cause of DMARC failure.
  • SPF/DKIM Passing Not Enough: Passing SPF and DKIM are necessary but not sufficient conditions for DMARC to pass. Alignment is also required.
  • DMARC as Policy Layer: DMARC functions as a policy layer on top of SPF and DKIM, allowing domain owners to specify how email receivers should handle messages that fail authentication.
  • Forwarding Breaks DMARC: Email forwarding can disrupt SPF and DKIM alignment, leading to DMARC failures.
  • Subdomain Reporting is Key: Check DMARC reports specifically for the sending subdomain, as policies may differ from the parent domain.

Key considerations

  • Check SPF/DKIM Alignment: Carefully verify that the domain used for SPF (MAIL FROM) and DKIM (d= tag) matches the domain in the 'From' header.
  • Review DMARC Reports Regularly: Analyze DMARC reports to identify alignment issues and potential spoofing activity.
  • Implement Forwarding Solutions: Consider solutions for email forwarding, such as SRS (Sender Rewriting Scheme) or DKIM signing by the forwarding server.
  • Correctly Configure Subdomains: If using subdomains for sending, ensure their DMARC records are properly configured.
  • Look for DMARC-Non Compliant tabs: Some services may segment data under DMARC Non-Compliant tabs, which states there's an issue.

What email marketers say
13Marketer opinions

DMARC failures, despite passing SPF and DKIM, primarily stem from alignment issues. This means that the domain used for SPF or DKIM authentication doesn't match the domain presented in the 'From' header. Forwarding can also disrupt DMARC. DMARC builds on SPF and DKIM by adding a policy layer. Checking subdomain versus organizational domain reporting is important. DMARC helps to validate email authenticity and protect against spoofing and phishing.

Key opinions

  • Alignment is Key: DMARC relies on alignment between the authenticated domain (SPF or DKIM) and the 'From' domain. If these don't match, DMARC fails.
  • Passing SPF/DKIM is Insufficient: Simply passing SPF and DKIM isn't enough; alignment is a separate requirement for DMARC compliance.
  • Subdomain Reporting: Ensure you're reviewing DMARC reports for the correct subdomain, as it might have a different policy than the organizational domain.
  • Forwarding Issues: Email forwarding can break SPF and DKIM alignment, leading to DMARC failures.
  • DMARC Policy: DMARC has instructions for handling emails that fail authentication checks (SPF and DKIM). The email will still fail the DMARC check, according to the policy of the domain owner.

Key considerations

  • Check Alignment: Verify that the SPF 'MAIL FROM' domain and the DKIM 'd=' tag domain match the 'From' header domain.
  • Review DMARC Reports: Analyze DMARC reports to identify alignment failures and potential spoofing activity.
  • Address Forwarding: Implement solutions to handle forwarding scenarios, such as DKIM signing by the forwarding server.
  • Configure SPF and DKIM: Make sure you configure SPF and DKIM to use the same domain as the 'From' address.
  • Review Organizational Mismatch: DMARC checks the domain of the 'From' header against the authentication results. If these don't align, DMARC will fail, leading to deliverability issues.
Marketer view

Email marketer from Email Marketing Forum responds that even if SPF and DKIM records pass, a DMARC failure can occur if there's an organizational mismatch. DMARC checks the domain of the 'From' header against the authentication results. If these don't align, DMARC will fail, leading to deliverability issues.

October 2023 - Email Marketing Forum
Marketer view

Email marketer from Email Geeks explains that UIs saying 'passing' for SPF and DKIM is not the same as 'aligned' in the DMARC sense and it just means that they are not broken.

May 2023 - Email Geeks
Marketer view

Email marketer from Email Geeks explains that Dmarcian for sure shows when there’s a lack of alignment. Some people, though, may define success as, for example, raw SPF is passing even if the MAIL FROM domain for which SPF’s implemented is out of alignment. So say my visible from domain is <http://example.com|example.com> and my MAIL FROM is <http://foo.some-esp-or-another.com|foo.some-esp-or-another.com> such that foo passes raw SPF but it’s not <http://example.com|example.com> or a subdomain of <http://example.com|example.com> so it’s out of alignment and so is SPF failure from the POV of DMARC compliance.

November 2022 - Email Geeks
Marketer view

Email marketer from Valimail shares that DMARC builds on SPF and DKIM to validate the authenticity of emails, and protect email senders and recipients from fraud and phishing attacks. DMARC ensures that email messages align with the domain they claim to be sent from.

April 2024 - Valimail
Marketer view

Email marketer from Reddit shares that forwarding can cause DMARC failures. When a message is forwarded, the SPF record of the original sender no longer applies, and if the forwarding server doesn't DKIM-sign the message with the correct domain, DMARC will fail.

March 2023 - Reddit
Marketer view

Email marketer from EmailAuth shares that DMARC provides instructions to email receivers on how to handle emails that fail authentication checks (SPF and DKIM). If SPF and DKIM pass but are not aligned, the email will still fail the DMARC check, according to the policy of the domain owner.

June 2022 - EmailAuth
Marketer view

Email marketer from Email Geeks recommends that the client check reporting for the org domain versus subdomain as subdomains inherit the DMARC policy of the org domain by default unless they have an explicit DMARC record of their own, and since is looked like they were using a subdomain, the client will want to make sure they are looking at the reporting for the subdomain (which may be out of alignment) versus the org domain (which may not have any issues).

November 2023 - Email Geeks
Marketer view

Email marketer from Mailjet explains that DMARC alignment issues arise when the domain used for authentication (SPF or DKIM) doesn't match the domain found in the 'From' address. Resolving these issues often involves configuring SPF and DKIM to use the same domain as the 'From' address.

August 2023 - Mailjet
Marketer view

Email marketer from EasyDMARC shares that DMARC helps reduce email spoofing and phishing attacks by verifying that an email was sent from the domain it claims to be from. It also gives domain owners control over what happens to messages that fail authentication checks, either reject, quarantine or deliver.

June 2021 - EasyDMARC
Marketer view

Email marketer from Email Geeks explains that unalignment is a likely cause and Dmarcian will segment those data under DMARC Non-Compliant or DMARC Non-Capable tabs, which states there's an issue. Also, no one should ever think about enforcing DMARC policy if the knowledge of Alignment lacks and some judge via MBPs Headers analysis indicating SPF or DKIM are passing, without knowing that those checks don't give you the Alignment Pass/Fail results.

May 2024 - Email Geeks
Marketer view

Email marketer from AuthSMTP explains that for DMARC to pass, either SPF or DKIM must pass *and* align with the domain in the From: header. It’s not enough for SPF and DKIM to simply be present and valid; they must also be aligned with the From: domain. Misalignment occurs when, for example, SPF passes using a domain other than the one in the From: header.

October 2022 - AuthSMTP
Marketer view

Email marketer from Postmark explains that to resolve DMARC failures when SPF and DKIM pass, you should check DMARC alignment. For SPF, the 'header from' domain and the 'mail from' domain must match. For DKIM, the 'd=' tag in the DKIM signature must match the 'header from' domain.

January 2023 - Postmark
Marketer view

Email marketer from Stack Overflow responds that passing SPF and DKIM only validates that the message was authorized to be sent from a given infrastructure, DMARC cares more about the relationship between the domain used to authorize the message and the domain presented to the user.

July 2023 - Stack Overflow

What the experts say
4Expert opinions

The experts agree that the primary reason for DMARC failing despite passing SPF and DKIM is an alignment issue. This means the domain used for authenticating the email (via SPF or DKIM) doesn't match the domain in the 'From' header. While other issues like body hashing could contribute, alignment is the most common culprit.

Key opinions

  • Alignment is Key: DMARC requires alignment between the SPF/DKIM authenticated domain and the 'From' domain.
  • Passing is Not Enough: Valid SPF and DKIM records are necessary but not sufficient for DMARC to pass; they must also align.
  • Domain Consistency: The domains used in SPF and DKIM values, ideally, should be the same as the '.fr' domain in the 'From' header.
  • Possible Body Hashing Issues: While less common, problems with body hashing can also cause signature failures and DMARC issues.

Key considerations

  • Verify Alignment: Ensure the domains used for SPF and DKIM authentication fully match the 'From' header domain.
  • Check Domain Configuration: Confirm that the '.fr' domain is correctly configured in both SPF and DKIM records.
  • Investigate Body Hashing: If alignment is correct, examine the email for potential body hashing issues that might be invalidating the DKIM signature.
Expert view

Expert from Email Geeks suggests the DMARC failure might stem from an alignment issue or a problem with body hashing causing signature failure.

May 2021 - Email Geeks
Expert view

Expert from Email Geeks clarifies a DMARC alignment issue means one of the domains in the SPF and DKIM value has to be the .fr domain, ideally both.

September 2021 - Email Geeks
Expert view

Expert from Email Geeks says the messages could be fully authenticated, just not aligned in a meaningful way and that is causing issues.

August 2023 - Email Geeks
Expert view

Expert from Word to the Wise explains that the most common reason for DMARC failing despite passing SPF/DKIM is an alignment issue. The authenticated domain (the domain in the MAIL FROM for SPF or the d= tag for DKIM) must match the domain in the From: header. Even if both SPF and DKIM pass, if neither is aligned, DMARC will fail.

November 2024 - Word to the Wise

What the documentation says
4Technical articles

The documentation highlights that DMARC failures, despite passing SPF and DKIM, are typically due to alignment issues. The domain used for SPF or DKIM verification must match the domain in the 'From' header. DMARC builds upon SPF and DKIM by adding a policy layer that enables domain owners to dictate how email receivers should handle messages failing SPF and DKIM checks, protecting against unauthorized use, phishing, and spam.

Key findings

  • Alignment is Crucial: DMARC mandates alignment between the domain used for SPF or DKIM authentication and the domain present in the 'From' header.
  • SPF/DKIM Alone Insufficient: Passing SPF and DKIM is not enough to ensure DMARC compliance; alignment is a separate and essential requirement.
  • DMARC as a Policy Layer: DMARC functions as a policy layer built upon SPF and DKIM, allowing domain owners to specify how email receivers should handle authentication failures.
  • Protection Against Abuse: DMARC is designed to safeguard email domains from unauthorized use, including phishing and spam attacks.

Key considerations

  • Verify Alignment Settings: Ensure that SPF alignment (MAIL FROM domain matching From domain) or DKIM alignment (d domain in DKIM signature matching From domain) is correctly configured.
  • Configure DMARC Records: Set up a TXT record in the DNS settings of your domain to specify how email receivers should handle messages that fail DMARC checks.
  • Address Unauthorized Use: Implement DMARC to protect your domain from phishing, spam, and other unauthorized activities.
Technical article

Documentation from Microsoft explains that DMARC is designed to protect email domains from being used for unauthorized purposes, such as phishing and spam. DMARC is set up by creating a TXT record in the DNS settings for your domain, which specifies how email receivers should handle emails that fail DMARC checks.

December 2021 - Microsoft
Technical article

Documentation from RFC explains that DMARC builds on top of SPF and DKIM by adding a policy layer. It allows domain owners to specify how email receivers should handle messages that fail SPF and DKIM checks, addressing the problem of unauthorized use of their domains.

September 2022 - RFC 6376
Technical article

Documentation from Dmarcian Knowledge Base explains that DMARC failure despite passing SPF and DKIM often points to an alignment issue, where the domain used for SPF or DKIM verification doesn't match the domain in the 'From' header.

November 2024 - Dmarcian Knowledge Base
Technical article

Documentation from Google explains that DMARC alignment requires either SPF alignment (the 'MAIL FROM' domain matches the 'From' domain) or DKIM alignment (the 'd' domain in the DKIM signature matches the 'From' domain). If neither aligns, DMARC can fail even if SPF and DKIM pass.

July 2022 - Google