Skip to main content

DMARC

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is an email authentication protocol that builds on SPF and DKIM, letting domain owners publish a policy specifying how receivers should handle unauthenticated mail and receive aggregate and forensic reports on authentication results.

Definition

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a scalable email authentication mechanism that allows a domain owner to publish a machine-readable policy in DNS, declaring what receiving mail servers should do when an incoming message fails SPF or DKIM alignment checks, and enabling those servers to send structured reports back to the domain owner. DMARC’s three policy values — none, quarantine, and reject — give domain owners graduated control over how unauthenticated email purporting to come from their domain is treated by the global receiving infrastructure.

DMARC was developed collaboratively by a group of industry participants including PayPal, Google, Microsoft, Yahoo, ReturnPath, and other email-ecosystem stakeholders, and first published as IETF RFC 7489 in March 2015. The specification is maintained by the DMARC.org working group. It extends and coordinates two earlier authentication standards: SPF (RFC 7208) and DKIM (RFC 6376), which it uses as input signals but does not replace.

How It Works

A DMARC policy is published as a DNS TXT record at _dmarc.<domain>. A representative record looks like: v=DMARC1; p=quarantine; rua=mailto:[email protected]; ruf=mailto:[email protected]; pct=100; adkim=s; aspf=s. The key tags are:

The critical innovation DMARC introduces is identifier alignment. An SPF pass or DKIM pass is only considered DMARC-compliant if the authenticated domain aligns with the RFC5322.From header domain — the “From:” address that email users see. This closes the gap left by SPF and DKIM operating independently: a message can pass SPF on a different domain (the envelope sender) and pass DKIM for a third-party signing domain, yet still be fraudulent if the From header shows a different domain. DMARC requires at least one of SPF or DKIM to produce an aligned pass.

Aggregate reports (RUA) are delivered as compressed XML files, typically within 24 hours of the report period end, by mailbox providers including Google (Gmail), Microsoft (Outlook/Exchange Online Protection), Yahoo Mail, Apple iCloud Mail, Comcast, and others. These reports contain per-source-IP counts of messages, SPF results, DKIM results, and DMARC disposition. Tools such as DMARCIAN, Valimail, Postmark DMARC Digests, and Google Postmaster Tools provide dashboards that parse and visualise these reports.

Where You Encounter It

DMARC is encountered wherever high-volume or high-stakes email sending occurs. Since February 2024, Google and Yahoo both require senders of more than 5,000 messages per day to Gmail or Yahoo Mail addresses to have a DMARC record published with at least p=none — a significant industry policy change that effectively made DMARC mandatory for bulk senders. Microsoft announced similar requirements for Outlook.com consumer mailboxes in 2025.

For contest platforms dispatching email confirmation votes at scale, DMARC serves two roles. First, it protects the sending domain’s reputation by instructing receiving servers to reject forged messages — preventing a third party from spoofing the contest platform’s From address in phishing campaigns, which would damage the domain’s deliverability standing. Second, DMARC aggregate reports provide an operational monitoring channel: the domain owner can see, across all participating mailbox providers, what fraction of outbound messages are passing SPF and DKIM, and flag infrastructure misconfigurations before they result in bulk confirmation-email failures.

Email service providers including SendGrid, Mailgun, Amazon SES, Postmark, and SparkPost publish guidance on configuring DMARC alongside their own sending infrastructure. DNS diagnostic tools including MXToolbox DMARC Lookup, DMARCIAN’s DMARC Inspector, and EasyDMARC’s record checker allow domain owners to validate published policies.

Practical Examples

A contest company starts sending confirmation emails using a new subdomain confirm.votes.example.com. The parent domain votes.example.com has p=reject in its DMARC record. Because the SPF and DKIM records for the new subdomain are not yet configured, confirmation emails fail DMARC alignment and are rejected by Gmail. The administrator diagnoses the issue through aggregate report data showing 100% DMARC failure on the subdomain, adds the appropriate SPF include and DKIM selector DNS records, and resets the subdomain’s DMARC subdomain policy (sp=none) temporarily during rollout.

A brand runs a photo-submission contest with prizes totalling $50,000. A fraudster attempts to send phishing emails using the brand’s contest domain as the From address, directing voters to a fake confirmation page to harvest email credentials. Because the domain’s DMARC policy is p=reject, Gmail, Outlook, and Yahoo Mail all discard the fraudulent messages before delivery, protecting both contest participants and the brand’s sender reputation.

DMARC depends on both SPF Record and DKIM as its authentication inputs — a DMARC pass requires at least one of these to align with the From header domain. For contest operations, the combined effect of SPF, DKIM, and DMARC on inbox placement is the primary technical factor determining whether Email Confirmation Vote confirmation messages reach voters’ inboxes. The BIMI standard, which allows brand logo display in inbox clients as a trust indicator, requires a p=quarantine or p=reject DMARC policy as a prerequisite.

From the blog — guides & case studies

Practical guides, technical deep-dives, and anonymized case studies.60+ articles. Selection rotates.

Victor Williams — founder of Buyvotescontest.com
Victor Williams
Online · usually replies in 5 min

Hi 👋 — drop your contest URL and I'll send a price quote within an hour. No card needed yet.