Email security protocols (SPF, DKIM, DMARC) work together to authenticate email senders and prevent spoofing. They help receiving mail servers verify that messages claiming to be from your domain are legitimate.
Common Uses
Prevent attackers from sending phishing emails that appear to come from your domain
Improve email deliverability by proving sender authenticity to receiving servers
Receive reports about emails sent using your domain name
Protect your brand reputation from abuse
Diagnostic Value
Identify missing or misconfigured email authentication records
Detect overly permissive SPF policies that allow spoofing
Find DKIM keys that may be weak or in test mode
Verify DMARC policy enforcement levels
History
Email was designed in the 1970s-80s without authentication - anyone could claim any sender address. SPF emerged in 2003, DKIM in 2007, and DMARC in 2012 to address this fundamental security gap. Today, major email providers like Google and Microsoft require these records for reliable delivery.
google.com
65/100
Security Score
Moderate email security. Several improvements are recommended to better protect your domain.
SPF(Sender Policy Framework)
SPF (Sender Policy Framework)
SPF allows domain owners to specify which mail servers are authorized to send email on their behalf. Receiving servers check SPF to verify that incoming mail from your domain comes from an approved source.
What You'll See
The SPF record (TXT record starting with v=spf1)
Authorized mechanisms (ip4, ip6, include, a, mx)
The 'all' qualifier indicating how to handle unauthorized senders
DNS lookup count (must be 10 or fewer)
Diagnostic Value
Missing SPF record leaves your domain open to spoofing
+all (pass all) is dangerous - anyone can send as your domain
Exceeding 10 DNS lookups causes SPF to fail (permerror)
Multiple SPF records are invalid - only one allowed
The 'all' Qualifier Options
The 'all' mechanism at the end of an SPF record specifies how to handle senders not matching any previous mechanism:
-all (Fail/Hard Fail) Reject unauthorized senders. Strictest and most secure. Use when you're confident all legitimate sources are listed.
~all (SoftFail) Mark as suspicious but accept. Most common. Unauthorized mail typically goes to spam. Good for transitioning.
?all (Neutral) No assertion. Provides no protection - equivalent to no SPF. Avoid.
+all (Pass) Allow ALL senders. DANGEROUS - defeats SPF entirely. Never use.
Start with ~all, monitor with DMARC reports, then move to -all once all legitimate senders are confirmed.
History
SPF was proposed by Meng Weng Wong in 2003 and standardized in RFC 4408 (2006), later updated in RFC 7208 (2014). It was the first widely-adopted email authentication mechanism and remains fundamental to email security.
WARNING
Record
v=spf1 include:_spf.google.com ~all
DNS Lookups: 2/10
Using ~all (softfail) - consider -all for stricter enforcement
DKIM(DomainKeys Identified Mail)
DKIM (DomainKeys Identified Mail)
DKIM adds a digital signature to outgoing emails, allowing receiving servers to verify the message hasn't been altered in transit and truly originated from your domain.
What You'll See
DKIM selectors found for your domain
Public key information from DNS records
Key type (RSA or Ed25519) and size
Test mode status (t=y indicates testing, not enforced)
Diagnostic Value
Missing DKIM reduces deliverability and authentication
Keys smaller than 2048 bits are considered weak
Test mode (t=y) means signatures aren't being enforced
Empty or revoked keys (p=) indicate disabled selectors
History
DKIM evolved from DomainKeys (Yahoo, 2004) and Identified Internet Mail (Cisco). The merged standard was published as RFC 4871 in 2007, updated in RFC 6376 (2011). Unlike SPF, DKIM survives email forwarding since it signs message content.
UNKNOWN
No DKIM selectors found from common selector list
DKIM selectors vary by email provider - check your email service documentation
DMARC(Domain-based Message Authentication)
DMARC (Domain-based Message Authentication)
DMARC ties SPF and DKIM together with a policy telling receiving servers what to do when authentication fails. It also enables reporting so domain owners can monitor authentication results.
What You'll See
The DMARC policy (p=none, p=quarantine, or p=reject)
Subdomain policy (sp=) if different from main domain
Percentage of messages the policy applies to (pct=)
Report URIs for aggregate (rua=) and forensic (ruf=) reports
Diagnostic Value
Missing DMARC means no policy enforcement even with SPF/DKIM
p=none only monitors - no protection against spoofing
p=quarantine sends failures to spam; p=reject blocks them
No rua= means you won't receive authentication reports
History
DMARC was developed by a consortium including Google, Microsoft, Yahoo, and PayPal, published in 2012 and standardized in RFC 7489 (2015). It was created because SPF and DKIM alone couldn't specify what action to take on failure.