Skip to content

DMARC vs SPF: How They Work Together

Learn the difference between DMARC and SPF, and why DMARC builds on SPF to provide policy enforcement and reporting.

Overview

SPF and DMARC are not competing standards — they operate at different layers and are designed to be used together. SPF is a mechanism for authorizing which mail servers can send email for your domain. DMARC is a policy framework that uses SPF (and DKIM) as inputs to make enforcement decisions and generate reports.

Think of SPF as the building block and DMARC as the control layer built on top of it.

What SPF Does

Sender Policy Framework lets you publish a list of IP addresses and hostnames that are permitted to send email on behalf of your domain. This is stored as a TXT record in DNS. When a receiving mail server checks SPF, it looks up your record and compares the connecting server's IP against the authorized list.

SPF checks the envelope sender — the address used during the SMTP handshake (MAIL FROM), not the visible From header in the email client. This is a critical distinction for understanding why SPF alone is insufficient.

What DMARC Adds

DMARC builds on SPF in three important ways:

  • Alignment checking.DMARC requires that the domain in SPF's envelope sender matches the domain in the visible From header. Without this, an attacker could pass SPF using their own domain while showing your domain in the From header.
  • Policy enforcement. DMARC lets you instruct receiving servers to quarantine or reject emails that fail authentication — something SPF cannot do on its own.
  • Aggregate reporting. DMARC generates daily XML reports sent to your RUA address that show which IPs are sending email as your domain and whether they are passing or failing authentication.

Side-by-Side Comparison

FeatureSPFDMARC
Primary purposeAuthorize sending server IPsPolicy enforcement and reporting
What it checksEnvelope sender IP vs DNS recordSPF/DKIM results + alignment with From header
Provides aggregate reportingNoYes (RUA reports)
Can enforce reject policyNo — result is advisory onlyYes — with p=reject
Checks the visible From headerNoYes (via alignment)
Standalone spoofing protectionWeak — no From alignmentStrong — enforces alignment + policy
DNS record typeTXT on root domainTXT at _dmarc subdomain

Why SPF Alone Is Not Enough

SPF has two fundamental limitations that make it insufficient as a standalone protection mechanism:

  • No alignment with the visible From header. SPF only checks the MAIL FROM (envelope sender). A phisher can set their own domain as the envelope sender (so SPF passes), while displaying your domain in the From header that users actually see. This attack — called a display name spoof — bypasses SPF completely.
  • No enforcement mechanism.Even when SPF fails, receiving servers are not required to do anything about it. The SPF result is an input to the receiving server's spam filter, but there is no standardized action. DMARC provides that missing enforcement layer.

How They Work Together

When a DMARC-enabled receiving server processes an inbound email, it:

  1. Evaluates SPF by checking the envelope sender IP against the sending domain's SPF record.
  2. Checks SPF alignment — does the SPF-passing domain match the From header domain?
  3. Evaluates DKIM (if present) and checks DKIM alignment similarly.
  4. Looks up the sender's DMARC record to find the policy (none / quarantine / reject).
  5. Applies the policy if both SPF and DKIM fail or are misaligned.
  6. Sends aggregate report data to the domain owner's RUA address.

Recommendation

Every domain that sends email should have both SPF and DMARC configured. Start by publishing an accurate SPF record that covers all your sending sources. Then add a DMARC record with p=none and a rua= address to begin receiving reports. Use those reports to find gaps, fix alignment issues, and progressively move to p=reject.

Frequently Asked Questions

Do I need SPF if I have DMARC?

Yes. DMARC depends on either SPF or DKIM to pass and align. Without SPF, you have one fewer authentication signal. If DKIM fails for any reason (forwarding is not a factor here), DMARC will have no passing mechanism. Configure both for maximum resilience.

Will fixing SPF automatically fix my DMARC results?

It can help, but not necessarily. DMARC also requires alignment — the SPF-authenticated domain must match the From header domain. A valid SPF pass that uses a different domain (common with bulk email providers) will still fail DMARC alignment unless the subdomain alignment is configured correctly.

Can DMARC exist without SPF?

Yes, technically. DMARC can rely solely on DKIM for authentication. But publishing SPF in addition to DKIM is strongly recommended — it reduces the risk of a single point of failure and gives mail receivers more signals to make accurate decisions.

Start protecting your domain today

Ready to secure your email?

Start monitoring your DMARC reports today. Free 14-day trial, no credit card required.