Support

DNS Settings for Email: SPF, DKIM, DMARC, BIMI and How They Affect Deliverability

DNS Settings for Email: SPF, DKIM, DMARC, BIMI and How They Affect Deliverability
0.00
(0)
Views: 64969
Reading time: ~ 8 min.
Emails
04/13/26
NPPR TEAM Editorial
Table Of Contents

Updated: April 2026

TL;DR: SPF, DKIM, DMARC, and BIMI are DNS records that authenticate your emails and directly control inbox placement. As of 2026, Gmail and Yahoo reject emails from domains without all three core records (SPF+DKIM+DMARC). According to MailReach, inbox placement dropped to 87.2% — proper DNS setup is the difference between inbox and spam. If you need ready email accounts for campaigns — browse the catalog with instant delivery.

✅ Suits you if❌ Not for you if
You send marketing or cold outreach emailsYou only receive emails, never send campaigns
You manage domains for email infrastructureYou use only free Gmail without custom domain
You want to stop emails from landing in spamYou have a dedicated IT team handling all DNS

DNS email authentication is the foundation of modern email deliverability. Four protocols — SPF, DKIM, DMARC, and BIMI — work together to prove your identity, protect your domain from spoofing, and signal trust to receiving mail servers. Without them, your emails are treated as suspicious by default. With them properly configured, you unlock inbox rates of 85-95% instead of the 50-60% that unauthenticated senders typically see.

  1. Set up SPF to authorize your sending IPs
  2. Configure DKIM to sign every outgoing email
  3. Publish a DMARC policy to enforce authentication
  4. Add BIMI to display your brand logo in the inbox
  5. Test everything before launching any campaign

What Changed in DNS Email Authentication in 2026

  • Gmail and Yahoo made SPF + DKIM + DMARC mandatory for all bulk senders (5,000+ emails/day) — non-compliant senders see automatic rejection
  • DMARC enforcement moved from p=none recommendations to p=quarantine as the minimum for trusted delivery
  • BIMI adoption grew 40%+ as brands recognized its impact on open rates and trust signals
  • Gmail's spam complaint threshold dropped to 0.1% for high-volume senders
  • One-click unsubscribe in email headers became a hard requirement, not a suggestion
  • According to MailReach, Gmail inbox placement fell from 89.8% to 87.2% partly due to stricter authentication enforcement

SPF: Authorizing Your Sending IPs

SPF (Sender Policy Framework) is a DNS TXT record that tells receiving servers which IP addresses are allowed to send email from your domain. It's the first layer of authentication and the simplest to set up.

How SPF Works

When someone receives an email from your domain:

  1. The receiving server extracts the domain from the envelope sender (MAIL FROM)
  2. It queries DNS for the SPF record of that domain
  3. It checks whether the sending server's IP appears in the SPF record
  4. If yes → SPF passes. If no → SPF fails

SPF Record Syntax

A basic SPF record looks like this:

Related: How Email Delivery Works: SMTP, DNS Routing, and Spam Filters Explained

v=spf1 include:_spf.google.com include:sendgrid.net -all
ComponentMeaning
v=spf1SPF version (always spf1)
include:_spf.google.comAuthorize Google's mail servers
include:sendgrid.netAuthorize SendGrid's servers
-allReject emails from any other IP (hard fail)

SPF Qualifiers

QualifierSymbolWhat It Does
Pass+Authorize this IP (default)
Fail-Reject emails from unauthorized IPs
SoftFail~Accept but mark as suspicious
Neutral?No opinion — treated like no SPF

Always use -all (hard fail) in production. ~all (soft fail) is acceptable during testing but leaves your domain vulnerable to spoofing.

SPF Limitations

  • 10 DNS lookup limit — each include:, a:, mx:, and redirect: counts as one lookup. Exceeding 10 causes automatic SPF failure
  • No IP inheritance — nested includes count toward the limit too
  • One SPF record per domain — multiple TXT records with v=spf1 cause parsing errors

⚠️ Important: If you use multiple email services (Google Workspace + SendGrid + Mailchimp), you can quickly exceed the 10 DNS lookup limit. Use SPF flattening tools like dmarcian or AutoSPF to consolidate lookups into direct IP ranges.

DKIM: Cryptographic Email Signatures

DKIM (DomainKeys Identified Mail) adds a digital signature to every outgoing email, proving it wasn't altered during transit and tying it to your domain.

How DKIM Works

  1. Your mail server signs each outgoing email with a private key
  2. The signature is added as a DKIM-Signature header in the email
  3. The receiving server looks up your public key via DNS (a TXT record under selector._domainkey.yourdomain.com)
  4. It uses the public key to verify the signature
  5. If verification passes → DKIM passes. If it fails → the email may be flagged or rejected

DKIM Record Example

selector1._domainkey.yourdomain.com  TXT  "v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEB..."
ComponentMeaning
selector1Identifier for this key pair (you can have multiple)
_domainkeyStandard DKIM subdomain
v=DKIM1DKIM version
k=rsaKey type (RSA is standard)
p=The actual public key (base64 encoded)

DKIM Best Practices

  • Use 2048-bit keys minimum (1024-bit is considered weak in 2026)
  • Rotate keys every 6-12 months for security
  • Set up multiple selectors if you use different email services
  • Always test before going live — a broken DKIM signature is worse than no DKIM

Case: E-commerce brand sending 50,000 transactional emails/day through two services: Postmark for receipts, Mailchimp for newsletters. Problem: DKIM configured only for Postmark. All Mailchimp newsletters failing DKIM — 35% landing in spam. Action: Generated separate DKIM keys for Mailchimp (selector: mc1), published the public key in DNS, verified alignment in Mailchimp dashboard. Result: Mailchimp DKIM pass rate went from 0% to 99.8%. Spam rate dropped from 35% to 4%. Newsletter open rate increased by 22%.

Related: How Not to Get Into Spam: Text Errors, Forbidden Patterns, and Design Rules That Kill Deliverability

DMARC: The Policy Layer That Ties Everything Together

DMARC (Domain-based Message Authentication, Reporting & Conformance) is the enforcement protocol. It tells receiving servers what to do when SPF or DKIM fails, and sends you reports about authentication results.

How DMARC Works

  1. Receiving server checks SPF and DKIM results
  2. It verifies alignment — the domain in the From header must match the SPF/DKIM domain
  3. It checks the DMARC policy for your domain
  4. Based on the policy, it either delivers, quarantines, or rejects the email
  5. It sends aggregate (rua) and/or forensic (ruf) reports to addresses you specify

DMARC Record Syntax

_dmarc.yourdomain.com  TXT  "v=DMARC1; p=quarantine; rua=mailto:[email protected]; pct=100"
TagMeaningOptions
v=DMARC1DMARC versionAlways DMARC1
p=Policy for your domainnone / quarantine / reject
rua=Aggregate report addressYour email for reports
ruf=Forensic report addressDetailed failure reports
pct=Percentage of emails to apply policy1-100
adkim=DKIM alignment moder (relaxed) / s (strict)
aspf=SPF alignment moder (relaxed) / s (strict)

DMARC Implementation Roadmap

PhasePolicyDurationPurpose
1. Monitorp=none2-4 weeksCollect reports, identify all legitimate senders
2. Quarantinep=quarantine; pct=252-4 weeksTest impact on 25% of traffic
3. Increasep=quarantine; pct=1002-4 weeksApply to all traffic
4. Rejectp=rejectOngoingMaximum protection — spoofed emails blocked

⚠️ Important: Never jump straight to p=reject without monitoring first. If you have misconfigured SPF or DKIM, legitimate emails will be silently dropped. Start with p=none for at least 2 weeks and review DMARC reports before escalating.

Need email accounts with working authentication? Browse Gmail accounts and Mail.ru accounts — Google and Mail.ru handle SPF/DKIM automatically for their domains.

Related: Email Marketing Basics: How the Channel Works and Why Your Business Can't Ignore It

BIMI: Brand Logo in the Inbox

BIMI (Brand Indicators for Message Identification) is the newest email authentication standard. It displays your verified brand logo next to your emails in supporting inbox clients — a powerful trust and recognition signal.

BIMI Requirements

  1. DMARC must be at p=quarantine or p=reject (BIMI won't work with p=none)
  2. Your logo must be in SVG Tiny PS format (not regular SVG)
  3. For Gmail: you need a VMC (Verified Mark Certificate) from DigiCert or Entrust (~$1,500/year)
  4. For Apple Mail and Yahoo: VMC is recommended but not always required

BIMI Record Syntax

default._bimi.yourdomain.com  TXT  "v=BIMI1; l=https://yourdomain.com/logo.svg; a=https://yourdomain.com/vmc.pem"

Is BIMI Worth It?

FactorAssessment
Cost~$1,500/year for VMC (Gmail requirement)
Open rate impact+10-15% in early studies (Red Sift, 2025)
Brand recognitionSignificant — logo visibility in crowded inbox
Implementation effortMedium — requires DMARC at quarantine/reject first
SupportGmail, Apple Mail, Yahoo, AOL — not Outlook (yet)

For high-volume senders (100K+ emails/month), BIMI is worth the investment. For smaller operations, focus on SPF + DKIM + DMARC first.

How Authentication Affects Deliverability: The Numbers

According to market data, the impact of DNS authentication on email deliverability is substantial:

  • Domains with all three records (SPF+DKIM+DMARC): 85-95% inbox placement (SendGrid, 2025)
  • Domains with only SPF: 60-75% inbox placement
  • Domains with no authentication: 40-55% inbox placement
  • According to MailReach, Gmail's overall inbox placement is 87.2% — domains without proper authentication fall well below this average
  • Email marketing ROI is $36-40 per $1 spent (DMA/Litmus, 2025) — but only when emails reach the inbox

The email client market is dominated by Apple Mail (51.52%), Gmail (26.72%), and Outlook (7.06%) according to Litmus. Each handles authentication differently, but all three punish missing records.

Case: Media buying team managing 15 sending domains for cold outreach. Problem: 8 domains had SPF only, 4 had SPF+DKIM, 3 had full SPF+DKIM+DMARC. Overall inbox rate: 62%. Action: Configured DKIM and DMARC on all 15 domains. Set DMARC to p=none for 3 weeks, then moved to p=quarantine. Result: Overall inbox rate jumped to 86%. Response rate improved from 2.1% to 4.3%. Campaign ROI increased 2.4x.

Testing Your DNS Records

Before launching any campaign, verify that all records are correctly configured:

ToolWhat It TestsPrice
MXToolboxSPF, DKIM, DMARC records + blacklist checkFree
dmarcianDMARC reports analysis + SPF flatteningFree tier
Google Admin ToolboxGmail-specific authentication checksFree
mail-tester.comFull deliverability score (SPF, DKIM, DMARC, content)Free (limited)
GlockAppsInbox placement across 30+ providers$59/mo

Quick Test Process

  1. Send a test email to mail-tester.com — get an instant score out of 10
  2. Check SPF with dig TXT yourdomain.com or MXToolbox
  3. Verify DKIM with dig TXT selector._domainkey.yourdomain.com
  4. Confirm DMARC with dig TXT _dmarc.yourdomain.com
  5. Send test emails to Gmail, Outlook, and Yahoo — check "Show Original" to see authentication results

⚠️ Important: DNS changes take time to propagate — 15 minutes to 48 hours depending on TTL settings. After making any DNS changes, wait at least 1 hour before testing. Sending emails during propagation can cause intermittent authentication failures.

Quick Start Checklist

  • [ ] Create SPF record listing all authorized sending services — use -all qualifier
  • [ ] Generate DKIM keys (2048-bit minimum) for each email service you use
  • [ ] Publish DKIM public keys as TXT records under selector._domainkey.yourdomain.com
  • [ ] Create DMARC record starting with p=none and rua=mailto:[email protected]
  • [ ] Test all records with MXToolbox and mail-tester.com
  • [ ] Monitor DMARC reports for 2-4 weeks
  • [ ] Upgrade DMARC to p=quarantine after confirming all legitimate senders pass
  • [ ] Consider BIMI if sending 100K+ emails/month

Ready to launch email campaigns with proper infrastructure? Browse email accounts at npprteam.shop — over 250,000 orders fulfilled since 2019, with 95% instant automated delivery and support in 5-10 minutes.

Related articles

FAQ

Do I need SPF, DKIM, and DMARC all three for email delivery?

Yes. Since 2025, Gmail and Yahoo require all three for bulk senders (5,000+ emails/day). Even for smaller volumes, missing any one of them lowers your inbox rate significantly. SPF authorizes sending IPs, DKIM verifies message integrity, DMARC enforces the policy.

What is the SPF 10 DNS lookup limit?

SPF allows a maximum of 10 DNS lookups (includes, redirects, a, mx mechanisms). Exceeding this limit causes automatic SPF failure — your authentication breaks silently. Use SPF flattening tools to consolidate multiple include statements into direct IP ranges.

How long does it take for DNS changes to propagate?

Typically 15 minutes to 48 hours, depending on the TTL (Time To Live) value set on your DNS records. For email authentication records, set TTL to 300-600 seconds (5-10 minutes) during initial setup for faster propagation, then increase to 3600 (1 hour) once stable.

What DMARC policy should I start with?

Always start with `p=none` for 2-4 weeks. This monitors authentication results without affecting delivery, letting you identify any misconfigured services. Only move to `p=quarantine` after confirming all legitimate email sources pass SPF and DKIM.

Is BIMI worth setting up for small businesses?

BIMI requires a VMC certificate (~$1,500/year for Gmail), so it's primarily cost-effective for high-volume senders (100K+ emails/month). The open rate boost of 10-15% can justify the cost at scale. For smaller operations, focus your budget on SPF, DKIM, DMARC, and domain warmup first.

Can I use the same DKIM key for multiple email services?

No. Each email service (Google Workspace, SendGrid, Mailchimp, etc.) generates its own DKIM keys with unique selectors. You publish each service's public key as a separate DNS record. Multiple DKIM records are perfectly fine — unlike SPF, there's no limit.

What happens if my DMARC policy is set to reject and SPF fails?

With `p=reject`, emails that fail both SPF and DKIM alignment are completely blocked — they don't reach the recipient at all. This is why you must confirm all legitimate senders pass authentication before moving to reject. Use DMARC reports to verify before escalating.

How do DNS authentication records affect cold email deliverability?

DNS authentication is the single biggest factor in cold email deliverability after domain reputation. According to Instantly, approximately 17% of cold emails never reach the inbox — authentication failures are a leading cause. Proper SPF+DKIM+DMARC setup can improve cold email inbox rates by 20-30% compared to unauthenticated domains.

Meet the Author

NPPR TEAM Editorial
NPPR TEAM Editorial

Content prepared by the NPPR TEAM media buying team — 15+ specialists with over 7 years of combined experience in paid traffic acquisition. The team works daily with TikTok Ads, Facebook Ads, Google Ads, teaser networks, and SEO across Europe, the US, Asia, and the Middle East. Since 2019, over 30,000 orders fulfilled on NPPRTEAM.SHOP.

Articles