DNS Settings for Email: SPF, DKIM, DMARC, BIMI and How They Affect Deliverability

Table Of Contents
- What Changed in DNS Email Authentication in 2026
- SPF: Authorizing Your Sending IPs
- DKIM: Cryptographic Email Signatures
- DMARC: The Policy Layer That Ties Everything Together
- BIMI: Brand Logo in the Inbox
- How Authentication Affects Deliverability: The Numbers
- Testing Your DNS Records
- Quick Start Checklist
- What to Read Next
Updated: April 2026
TL;DR: SPF, DKIM, DMARC, and BIMI are DNS records that authenticate your emails and directly control inbox placement. As of 2026, Gmail and Yahoo reject emails from domains without all three core records (SPF+DKIM+DMARC). According to MailReach, inbox placement dropped to 87.2% — proper DNS setup is the difference between inbox and spam. If you need ready email accounts for campaigns — browse the catalog with instant delivery.
| ✅ Suits you if | ❌ Not for you if |
|---|---|
| You send marketing or cold outreach emails | You only receive emails, never send campaigns |
| You manage domains for email infrastructure | You use only free Gmail without custom domain |
| You want to stop emails from landing in spam | You have a dedicated IT team handling all DNS |
DNS email authentication is the foundation of modern email deliverability. Four protocols — SPF, DKIM, DMARC, and BIMI — work together to prove your identity, protect your domain from spoofing, and signal trust to receiving mail servers. Without them, your emails are treated as suspicious by default. With them properly configured, you unlock inbox rates of 85-95% instead of the 50-60% that unauthenticated senders typically see.
- Set up SPF to authorize your sending IPs
- Configure DKIM to sign every outgoing email
- Publish a DMARC policy to enforce authentication
- Add BIMI to display your brand logo in the inbox
- Test everything before launching any campaign
What Changed in DNS Email Authentication in 2026
- Gmail and Yahoo made SPF + DKIM + DMARC mandatory for all bulk senders (5,000+ emails/day) — non-compliant senders see automatic rejection
- DMARC enforcement moved from
p=nonerecommendations top=quarantineas the minimum for trusted delivery - BIMI adoption grew 40%+ as brands recognized its impact on open rates and trust signals
- Gmail's spam complaint threshold dropped to 0.1% for high-volume senders
- One-click unsubscribe in email headers became a hard requirement, not a suggestion
- According to MailReach, Gmail inbox placement fell from 89.8% to 87.2% partly due to stricter authentication enforcement
SPF: Authorizing Your Sending IPs
SPF (Sender Policy Framework) is a DNS TXT record that tells receiving servers which IP addresses are allowed to send email from your domain. It's the first layer of authentication and the simplest to set up.
How SPF Works
When someone receives an email from your domain:
- The receiving server extracts the domain from the envelope sender (MAIL FROM)
- It queries DNS for the SPF record of that domain
- It checks whether the sending server's IP appears in the SPF record
- If yes → SPF passes. If no → SPF fails
SPF Record Syntax
A basic SPF record looks like this:
Related: How Email Delivery Works: SMTP, DNS Routing, and Spam Filters Explained
v=spf1 include:_spf.google.com include:sendgrid.net -all | Component | Meaning |
|---|---|
| v=spf1 | SPF version (always spf1) |
| include:_spf.google.com | Authorize Google's mail servers |
| include:sendgrid.net | Authorize SendGrid's servers |
| -all | Reject emails from any other IP (hard fail) |
SPF Qualifiers
| Qualifier | Symbol | What It Does |
|---|---|---|
| Pass | + | Authorize this IP (default) |
| Fail | - | Reject emails from unauthorized IPs |
| SoftFail | ~ | Accept but mark as suspicious |
| Neutral | ? | No opinion — treated like no SPF |
Always use -all (hard fail) in production. ~all (soft fail) is acceptable during testing but leaves your domain vulnerable to spoofing.
SPF Limitations
- 10 DNS lookup limit — each
include:,a:,mx:, andredirect:counts as one lookup. Exceeding 10 causes automatic SPF failure - No IP inheritance — nested includes count toward the limit too
- One SPF record per domain — multiple TXT records with
v=spf1cause parsing errors
⚠️ Important: If you use multiple email services (Google Workspace + SendGrid + Mailchimp), you can quickly exceed the 10 DNS lookup limit. Use SPF flattening tools like dmarcian or AutoSPF to consolidate lookups into direct IP ranges.
DKIM: Cryptographic Email Signatures
DKIM (DomainKeys Identified Mail) adds a digital signature to every outgoing email, proving it wasn't altered during transit and tying it to your domain.
How DKIM Works
- Your mail server signs each outgoing email with a private key
- The signature is added as a DKIM-Signature header in the email
- The receiving server looks up your public key via DNS (a TXT record under
selector._domainkey.yourdomain.com) - It uses the public key to verify the signature
- If verification passes → DKIM passes. If it fails → the email may be flagged or rejected
DKIM Record Example
selector1._domainkey.yourdomain.com TXT "v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEB..." | Component | Meaning |
|---|---|
| selector1 | Identifier for this key pair (you can have multiple) |
| _domainkey | Standard DKIM subdomain |
| v=DKIM1 | DKIM version |
| k=rsa | Key type (RSA is standard) |
| p= | The actual public key (base64 encoded) |
DKIM Best Practices
- Use 2048-bit keys minimum (1024-bit is considered weak in 2026)
- Rotate keys every 6-12 months for security
- Set up multiple selectors if you use different email services
- Always test before going live — a broken DKIM signature is worse than no DKIM
Case: E-commerce brand sending 50,000 transactional emails/day through two services: Postmark for receipts, Mailchimp for newsletters. Problem: DKIM configured only for Postmark. All Mailchimp newsletters failing DKIM — 35% landing in spam. Action: Generated separate DKIM keys for Mailchimp (selector: mc1), published the public key in DNS, verified alignment in Mailchimp dashboard. Result: Mailchimp DKIM pass rate went from 0% to 99.8%. Spam rate dropped from 35% to 4%. Newsletter open rate increased by 22%.
Related: How Not to Get Into Spam: Text Errors, Forbidden Patterns, and Design Rules That Kill Deliverability
DMARC: The Policy Layer That Ties Everything Together
DMARC (Domain-based Message Authentication, Reporting & Conformance) is the enforcement protocol. It tells receiving servers what to do when SPF or DKIM fails, and sends you reports about authentication results.
How DMARC Works
- Receiving server checks SPF and DKIM results
- It verifies alignment — the domain in the From header must match the SPF/DKIM domain
- It checks the DMARC policy for your domain
- Based on the policy, it either delivers, quarantines, or rejects the email
- It sends aggregate (rua) and/or forensic (ruf) reports to addresses you specify
DMARC Record Syntax
_dmarc.yourdomain.com TXT "v=DMARC1; p=quarantine; rua=mailto:[email protected]; pct=100" | Tag | Meaning | Options |
|---|---|---|
| v=DMARC1 | DMARC version | Always DMARC1 |
| p= | Policy for your domain | none / quarantine / reject |
| rua= | Aggregate report address | Your email for reports |
| ruf= | Forensic report address | Detailed failure reports |
| pct= | Percentage of emails to apply policy | 1-100 |
| adkim= | DKIM alignment mode | r (relaxed) / s (strict) |
| aspf= | SPF alignment mode | r (relaxed) / s (strict) |
DMARC Implementation Roadmap
| Phase | Policy | Duration | Purpose |
|---|---|---|---|
| 1. Monitor | p=none | 2-4 weeks | Collect reports, identify all legitimate senders |
| 2. Quarantine | p=quarantine; pct=25 | 2-4 weeks | Test impact on 25% of traffic |
| 3. Increase | p=quarantine; pct=100 | 2-4 weeks | Apply to all traffic |
| 4. Reject | p=reject | Ongoing | Maximum protection — spoofed emails blocked |
⚠️ Important: Never jump straight to
p=rejectwithout monitoring first. If you have misconfigured SPF or DKIM, legitimate emails will be silently dropped. Start withp=nonefor at least 2 weeks and review DMARC reports before escalating.Need email accounts with working authentication? Browse Gmail accounts and Mail.ru accounts — Google and Mail.ru handle SPF/DKIM automatically for their domains.
Related: Email Marketing Basics: How the Channel Works and Why Your Business Can't Ignore It
BIMI: Brand Logo in the Inbox
BIMI (Brand Indicators for Message Identification) is the newest email authentication standard. It displays your verified brand logo next to your emails in supporting inbox clients — a powerful trust and recognition signal.
BIMI Requirements
- DMARC must be at
p=quarantineorp=reject(BIMI won't work withp=none) - Your logo must be in SVG Tiny PS format (not regular SVG)
- For Gmail: you need a VMC (Verified Mark Certificate) from DigiCert or Entrust (~$1,500/year)
- For Apple Mail and Yahoo: VMC is recommended but not always required
BIMI Record Syntax
default._bimi.yourdomain.com TXT "v=BIMI1; l=https://yourdomain.com/logo.svg; a=https://yourdomain.com/vmc.pem" Is BIMI Worth It?
| Factor | Assessment |
|---|---|
| Cost | ~$1,500/year for VMC (Gmail requirement) |
| Open rate impact | +10-15% in early studies (Red Sift, 2025) |
| Brand recognition | Significant — logo visibility in crowded inbox |
| Implementation effort | Medium — requires DMARC at quarantine/reject first |
| Support | Gmail, Apple Mail, Yahoo, AOL — not Outlook (yet) |
For high-volume senders (100K+ emails/month), BIMI is worth the investment. For smaller operations, focus on SPF + DKIM + DMARC first.
How Authentication Affects Deliverability: The Numbers
According to market data, the impact of DNS authentication on email deliverability is substantial:
- Domains with all three records (SPF+DKIM+DMARC): 85-95% inbox placement (SendGrid, 2025)
- Domains with only SPF: 60-75% inbox placement
- Domains with no authentication: 40-55% inbox placement
- According to MailReach, Gmail's overall inbox placement is 87.2% — domains without proper authentication fall well below this average
- Email marketing ROI is $36-40 per $1 spent (DMA/Litmus, 2025) — but only when emails reach the inbox
The email client market is dominated by Apple Mail (51.52%), Gmail (26.72%), and Outlook (7.06%) according to Litmus. Each handles authentication differently, but all three punish missing records.
Case: Media buying team managing 15 sending domains for cold outreach. Problem: 8 domains had SPF only, 4 had SPF+DKIM, 3 had full SPF+DKIM+DMARC. Overall inbox rate: 62%. Action: Configured DKIM and DMARC on all 15 domains. Set DMARC to p=none for 3 weeks, then moved to p=quarantine. Result: Overall inbox rate jumped to 86%. Response rate improved from 2.1% to 4.3%. Campaign ROI increased 2.4x.
Testing Your DNS Records
Before launching any campaign, verify that all records are correctly configured:
| Tool | What It Tests | Price |
|---|---|---|
| MXToolbox | SPF, DKIM, DMARC records + blacklist check | Free |
| dmarcian | DMARC reports analysis + SPF flattening | Free tier |
| Google Admin Toolbox | Gmail-specific authentication checks | Free |
| mail-tester.com | Full deliverability score (SPF, DKIM, DMARC, content) | Free (limited) |
| GlockApps | Inbox placement across 30+ providers | $59/mo |
Quick Test Process
- Send a test email to mail-tester.com — get an instant score out of 10
- Check SPF with
dig TXT yourdomain.comor MXToolbox - Verify DKIM with
dig TXT selector._domainkey.yourdomain.com - Confirm DMARC with
dig TXT _dmarc.yourdomain.com - Send test emails to Gmail, Outlook, and Yahoo — check "Show Original" to see authentication results
⚠️ Important: DNS changes take time to propagate — 15 minutes to 48 hours depending on TTL settings. After making any DNS changes, wait at least 1 hour before testing. Sending emails during propagation can cause intermittent authentication failures.
Quick Start Checklist
- [ ] Create SPF record listing all authorized sending services — use
-allqualifier - [ ] Generate DKIM keys (2048-bit minimum) for each email service you use
- [ ] Publish DKIM public keys as TXT records under
selector._domainkey.yourdomain.com - [ ] Create DMARC record starting with
p=noneandrua=mailto:[email protected] - [ ] Test all records with MXToolbox and mail-tester.com
- [ ] Monitor DMARC reports for 2-4 weeks
- [ ] Upgrade DMARC to
p=quarantineafter confirming all legitimate senders pass - [ ] Consider BIMI if sending 100K+ emails/month
Ready to launch email campaigns with proper infrastructure? Browse email accounts at npprteam.shop — over 250,000 orders fulfilled since 2019, with 95% instant automated delivery and support in 5-10 minutes.































