Chat +1-888-563-5277 [email protected]

Why is DMARC Failing

In this article, we cover the reasons why is DMARC failing, and what you should do to investigate and overcome this issue.

Before we dive into more details, let’s talk more about the key value of DMARC, which is Domain Alignment.

DMARC Alignment & Reasons for DMARC Failures

What is Domain Alignment? Domain Alignment is the core concept of DMARC – That is, verifying that the email address in the From: header is the actual sender of the message.

Practically, this means that the domain SPF check (which is based on Envelope From: or Return-Path address) and the DKIM signing domain (d=example.net) are in alignment with the message From: address.

See the screenshot below:

Email Header
Email Header

Now, let’s get back to DMARC Failures, and discuss different cases that can lead to this scenario, how you should investigate, recognize, and come to a solution.

DMARC Failure Cases

Case 1: If you don’t set up DKIM Signature, ESPs such as GSuite & Office365 sign all your outgoing emails with their default DKIM Signature Key. (e.g d=domain.gappssmtp.com for Google & d=domain.onmicrosoft.com for Office365) – The default signing is NOT your domain. That’s only achieved by making the right configurations and entries in your DNS Provider (like GoDaddy, Rackspace, Cloudflare). So, if someone receives an email from example.com but it is signed with example.gappssmtp.com or example.onmicrosoft.com, DMARC will Fail because of misalignment

You can see the examples of this case with actual screenshots from the EasyDMARC dashboard.

DMARC Failing due to GSuite using default DKIM Signature, and not authorized in SPF Record

GSuite DKIM
GSuite DKIM

DMARC Failing due to Office365 using default DKIM Signature, and not authorized in SPF Record

Office365 DKIM
Office365 DKIM

Case 2: If you use Third-Party service providers (like MailChimp, SendGrid, HubSpot, ZenDesk) for your marketing, transactional and helpdesk emails, you have to permit them to send emails on your domain behalf.
That is achieved by pointing DNS entries (SPF & DKIM) from your DNS Provider (like GoDaddy, Cloudflare, or Rackspace) to authorize and ‘whitelist’ the given servers. 

These providers sign your emails with their domain name by default, and your recipients generally see “via sendgrid.net”, “via thirdpartyprovider.com” message on your emails, thus leading to DMARC misalignment and failure.

Below you can see the examples of this case with screenshots from the EasyDMARC dashboard.

DMARC Failing due to emails sent through SendGrid account not properly signed with DKIM and SPF for a unique domain.

Sendgrid
Sendgrid

DMARC Failing due to emails sent through ZenDesk account not properly signed with DKIM and SPF for a unique domain

Zendesk
Zendesk

Case 3: Forwarding entities altering your message body and headers, leading to DKIM Failure. You can read more about SPF/DKIM/DMARC behavior during Forwarding in this article.

Case 4: You are a spoofing target – That is, cybercriminals are sending emails on your domain behalf. These are unauthorized sources, failing both SPF & DKIM Authentication results, thus leading to DMARC Failure, which is mainly visible under the ‘Threat/Unknown’ tab of your EasyDMARC dashboard.

E.g

Threats and Unknowns
Threats and Unknowns

Investigation Process

So you have started your DMARC journey and been receiving reports in your EasyDMARC dashboard, and you might think “What to do next?” and “How would I enforce my DMARC Policy to Reject without any risks of blocking my legitimate sources?” 

Let’s cover this process with simple steps to help you succeed in this journey:

Step 1: Start your DMARC journey with Monitoring mode (p=none)

Step 2: Analyze your email ecosystem for the first 3-4 weeks

Step 3: Detect all your legitimate sources and authenticate them with SPF & DKIM

In our Plus & Business packages, we identify Email Vendors and guide you with all the configuration steps.

Email Vendors
Email Vendors

Step 4: Make sure you properly authenticate all your legitimate servers with SPF & DKIM and reach DMARC Alignment and Compliance

Step 5: Enforce your DMARC Policy to higher levels (Quarantine and/or Reject) gradually

You can find more about DMARC in DMARC RFC.

 

DMARC Policy Overrides

When analyzing DMARC Aggregate reports, you may come across Policy Overrides, listed on the...

Read More

Email forwarding and DMARC DKIM SPF

Usually, you can see some problems with email authentication protocols during the email forwarding....

Read More

DMARC - The Ultimate Guide

Email security breaches cost billions of dollars every year, ranging from $50k per attack...

Read More