Demystifying SPF, DKIM and DMARC authentication protocols

Learn about the SPF, DKIM and DMARC email authentication protocols, why to use them and how to configure them with Dialog Insight.
Sophie Lamarche
26 March 2021
Omni-Channel Marketing Campaign
7 min
protocoles dauthentification spf dkim dmarc

I am certainly not the only one who regularly gets suspicious emails in my inbox. People with bad intentions pretend to be a trusted company in order to scam people by using fraudulent links. This is what we call phishing. Of course, these practices are harmful to everyone who gets scammed. But we don’t realize enough that it also impacts legitimate businesses that try to communicate with their customers. Email service providers like Outlook, Gmail, Yahoo, etc. are becoming more and more suspicious of any email that comes through them. Unfortunately, without action on your part, you are at risk of your email being blocked before it even reaches the recipient. How to avoid this? It’s relatively simple. In this article, you will learn what the main email authentication protocols are, what they are used for and how to configure them with Dialog Insight.

 

 

What is the purpose of email authentication protocols?

In most cases, recipients rely on the sender’s name and address to know who the email is from. However, it is easy for a spammer, through basic manipulations, to alter the sender’s name and address. This reality allows these scammers to use a trusted sender address to get unsuspecting consumers to open their emails. This poses a great threat to businesses who see their trusted and reputable brand name hijacked for malicious purposes.

Authentication protocols are configurations that will prove to email providers that your email is legitimate and that you are the owner of the domain you are sending from. It is therefore one of the most effective ways to prevent scammers from impersonating you by using your domain name. Authentication protocols are now considered a standard in email marketing and messages sent without at least an SPF and/or DKIM signature are immediately seen as suspicious by email analysis tools.

Another undeniable benefit of proper authentication is that it improves your deliverability. By being identified as a legitimate sender, you are much more likely to have your email reach the inbox rather than the junk folder. Beware though, email authentication is not the silver bullet that will solve your deliverability problems. It is ONE of many actions to take.

 

 

The main authentication protocols

SPF (Sender Policy Framework)

This registration authorizes certain servers to send emails using a specified domain name. Email providers are then able to verify that the incoming email comes from an authorized sender. The result of the verification is then recorded in the email header and is used to determine if the email is accepted in the recipient’s inbox.

However, the SPF protocol has some limitations. For example, forwarded emails may fail an authorization check even when the original email is legitimate because the forwarded emails originate from the IP address used by the forwarder, not the IP address of the original sender.

 

 

DKIM (DomainKeys Identified Mail)

DKIM adds an encrypted signature (public and private key) to the header of all outgoing messages. Obviously, this code is hidden and does not appear in the final visual of your email.  Email servers that receive signed messages use DKIM to decrypt the message header and verify the authenticity of the signature.

By using DKIM signing in addition to SPF, you take the security and protection of your identity to a much higher level.

 

 

Note that as a sender, configuring a DKIM signature will not prevent you from being considered a spammer by email providers if you do not apply good emailing practices. You should therefore make sure to respect these good practices when designing the content of your emails.

 

DMARC (Domain-based Message Authentication, Reporting and Conformance)

DMARC is a complementary authentication layer to SPF and DKIM that ensures that the sender identity presented to the recipient of an email is the same sender identity displayed to the receiving server. It allows the sender to certify that they are protected by SPF and DKIM. Although SPF and DKIM signatures help prove that an email is legitimate, their absence or failure does not prove the opposite. This technology, therefore, also allows the domain owner to specify how suspicious emails that fail SPF and DKIM checks are handled. They can either be placed in the spam folder or rejected.

DMARC also provides the ability to receive reports detailing which messages have passed or failed the verifications and, if applicable, where in the authentication protocol these failures occurred. This information is extremely valuable as it can help identify attacks and infrastructure vulnerabilities.

 

 

 

Configuring SPF, DKIM and DMARC authentication protocols with Dialog Insight

Unfortunately, just because you’re dealing with a trusted email provider doesn’t mean you’re automatically exempt from doing your own configurations. Some actions can only be done by you. To configure your domain’s SPF, DKIM, and DMARC authentication settings, you will need to access your server’s DNS records.

 

SPF

Note that if you are a Dialog Insight customer, configuring SPF is optional since Dialog Insight supports SPF by default if your mailings are sent from our shared addresses. If you are using a dedicated IP address for your emails, you will need to configure it and a procedure will then be provided.

 

DKIM

You can send a DKIM signature request to our support team, indicating the list of domains that you need. You will then only have to create the DNS entries that will be provided by our team in the domains and notify technical support when they are done. We will then validate the entries and activate the DKIM signatures for these domains in your account.

 

DMARC

There is no action that has to be taken by Dialog Insight to set up a DMARC policy. This is fully supported on the client-side. The https://dmarc.org website contains all the resources necessary for your team to fully understand DMARC, prepare an appropriate policy and test it.

 

Key takeaway

There are several email authentication protocols. It’s important to get the configurations right to protect your brand from spammers, who are unfortunately becoming more numerous and smarter. By combining SPF, DKIM and DMARC, your protection will be greatly enhanced. Don’t hesitate to call your email service provider for assistance if necessary.

And if you want to improve your email communications in general, take the opportunity to review best practices and optimize your templates for anti-spam filters.

Whitepapper_dialog insight

Would you like to know more about email deliverability?

Download our white paper to get all the details!

Find out how your company can benefit from Dialog Insight.

Read also

News

New feature: The Orchestrator

Orchestrate your campaigns more effectively to boost performance and deliver a smoother, more engaging customer experience.

Security and conformity

Consent and marketing performance: do we really have to choose?

Data protection has become essential, which means companies must rethink their marketing approach. Consent, compliance, and marketing performance are no longer at odds: discover how better-qualified data makes it possible to build more effective and sustainable strategies.

Omni-Channel Marketing Campaign

How to synchronize your communications in an omnichannel strategy.

In an omnichannel strategy, communication channels should not operate in silos. Email, SMS, and notifications can complement one another to create a seamless and consistent customer experience. Discover how to orchestrate these channels intelligently to send the right message, at the right time, through the right channel.

Data Management

Data collection and progressive profiling: a winning recipe!

In this era of “BIG DATA”, it's essential to use the data smartly if you want to reach your customers and prospects effectively.

Omni-Channel Marketing Campaign

Drive-to-store campaigns

Generating traffic in stores is often a goal to be achieved in retail stores. In addition to traditional advertising, the web can also do this very well. Here are a few examples.

Omni-Channel Marketing Campaign

How to Find Your Email Frequency Sweet Spot

Email frequency is something you should take seriously. The number of emails sent over a period of time can have an impact on your revenue and your engagement rate. So how to determine the optimal email frequency?

Marketer using Dialog Insight orchestration tool to plan campaigns and reduce email pressure

New: Orchestrator

Less pressure. More impact.

Orchestrate your campaigns more effectively to boost performance and deliver a seamless, engaging customer experience across every channel.

Take control of marketing pressure and prioritize your most strategic campaigns.

New at Dialog Insight

Every message, on the right channel, at the right time — automatically.

What if your campaigns could find on their own the ideal channel and the perfect moment to generate more impact?With Smart Channel and Omnichannel STO, your campaigns become more engaging and more effective: