DMARC When SPF and DKIM Both Fail (Total Authentication Loss)
DMARC passes only when at least one authenticated identifier aligns with the Header From domain *and* passes. When SPF yields fail or permerror and DKIM verification fails in the same delivery attempt, DMARC has nothing positive to reuse—policy evaluation sees only negative signals. This is common during migrations where DKIM keys moved but SPF still lists retired relays, or when forwarding breaks DKIM while SPF passes for the forwarder’s domain (both misaligned). Understanding whether both mechanisms truly failed versus merely misaligned guides remediation: alignment issues may need DNS tweaks, while double failure often signals infrastructure outage or outright spoofing attempts. Often the first step is confirming you even have a DMARC record and that the policy value matches your enforcement goal.
Updated for 2026 to reflect current Gmail, Outlook, and Yahoo behavior.
If policies are not enforced, review the DMARC setup guide.
Learn the bigger picture in our Email Authentication Explained guide and compare SPF vs DKIM vs DMARC to understand how these protocols work together.
Quick answer
- SPF alignment compares the SPF-authenticated domain to the RFC5322 From domain.
- DKIM alignment compares the `d=` domain (with relaxed modes) to the From domain.
- Both can be cryptographically ‘fine’ yet fail DMARC if domains differ under strict mode.
- `p=none` still reports the double-fail fact pattern for monitoring.
One-Minute Fix
Prioritise restoring *one* strong path—usually DKIM for third-party ESPs—so at least one aligned pass exists, then circle back to SPF includes for your primary MTA. Parallel fixes prevent thrash when both records change simultaneously without measurement.
spf=fail ... reason="..."
dkim=fail ... reason="..."
dmarc=fail p=noneUse aggregate reports to see whether failures concentrate on specific source IPs or header From domains.
Run free checkFree live DNS check. No signup required.
Wrong vs correct setup
Wrong response
Loosen DMARC by deleting SPF/DKIM records 'to reduce noise'Removing authentication does not improve legitimacy—it erases the signals DMARC needs entirely.
Staged repair
Fix DKIM selector → confirm pass → repair SPF include depth → re-evaluate SPF passSequence changes so you always retain at least one reliable authentication channel per stream.
Why both can fail together
Total failure often means an infrastructure event: DNS outage, bulk key deletion, or ESP incident—all paths degrade at once. In abuse cases, forged mail never matched either identifier. Misaligned authentication paths often show up as DMARC alignment failures or a reporting address that never receives data.
Risk profile
- Mailbox providers may reject or throttle aggressively with no positive auth.
- Brand trust erodes when customers receive unauthenticated spoofs.
- Internal phish simulations look artificially successful—tests may bypass real controls.
- Forensic workloads spike during grey failure windows.
Deliverability angle
Double-fail traffic usually sinks fastest—filters assume the worst when neither SPF nor DKIM vouch for the From identity. Over time, well-tuned DMARC aggregate reports and a clear policy stance are what help inbox providers separate your legitimate traffic from spoofing attempts.
Common causes
- Dual-stack IPv6 senders missing AAAA coverage in SPF mechanisms.
- ESPs rotating DKIM while customers still point SPF at old includes.
- Forwarding chains strip DKIM and break SPF alignment simultaneously.
- Accidental duplicate `_dmarc` records masking monitoring during the crisis.
What we checked
We test each protocol independently before synthesising DMARC outcomes. Bring Authentication-Results headers and DMARC XML when both modes fail to pinpoint whether alignment or mechanism evaluation broke first.
Live DNS lookup. No login. No saved domains. No tracking.
FAQ
Will ARC salvage DMARC?
ARC helps trusted intermediaries pass downstream context but does not create DMARC pass by itself at strict boundaries.
Should I raise p= during investigation?
Keep enforcement steady while fixing mechanisms—changing policy mid-outage worsens user impact.
Is BIMI affected?
Logo display depends on validated BIMI plus underlying DMARC success; double failures block both.
Next steps
- Segment failing mail streams by ESP and IP ranges.
- Restore DKIM signing with a known-good selector first.
- Align SPF includes with actual egress IPs.
- Analyse DMARC reports for alignment vs mechanism causes.
- Only tighten policy once steady pass rates return.
- Review the full troubleshooting guidance in the DMARC Hub.
- Explore sender authorization issues in the SPF Hub.
- Check signing and selector issues in the DKIM Hub.