Using email headers to verify an email’s authenticity and the future of DMARC

email
(Image credit: Geralt / Pixabay)

When someone receives and opens an email, they see the parts of the message that most people care about. 

In addition to the message content (the body), the recipient will typically see a few header fields, such as From:, To:, Subject:, and Date: that convey basic information about the claimed origin and topic of the message. 

Those headers represent just a small fraction of the headers that are part of the message.

The method for making hidden headers visible will differ depending on the mailbox provider. In Gmail, you can access the email header by clicking on the three dots in the upper right corner of a message and then “Show Original.” 

Other providers will have a choice on a menu such as “Show Message Source” or words to that effect. 

You’ll know you’ve found the right place when you see lots of text with lines starting with words like “Received:”, “Return-Path:”, and others, including the one we want to discuss “Authentication-Results:”, which will look something like this: 

Authentication Results

(Image credit: Valimail)

Email authentication protocols, including SPF, DKIM and DMARC, are used to establish the identity of the parties responsible for a given message. Mailbox providers will record the results of the authentication checks done on a message in this header, and here we can see that this message received “pass” verdicts for all three. 

The mailbox provider will then use the information recorded in this header and other information it knows about the responsible parties to determine where to place this message in the recipient’s mailbox. 

As a user, you may want to take a peek at this header if you’re curious about why a message ended up where it did. Note that fail verdicts here may make the message more likely to be placed in the user’s Junk folder, but pass verdicts are not guarantees of placement in the Inbox. 

These protocols reliably establish the identity of the responsible parties. If those parties are known to the mailbox provider to be senders of unwanted mail, it makes the mailbox provider’s decision to put the message in Junk easier.

Senders who are trying to get their authentication practices buttoned up can also make use of the “Authentication-Results” header, but it’s not their best tool for doing so. 

For the small sender using one server and one IP address, repeated cycles of "send message, look at Auth-Results header, adjust, repeat" is an approach (albeit a tedious one). However, for anyone sending with any volume, the “Authentication-Results” header is just a grain of sand on the beach of mail that a domain owner sends. 

For them, DMARC aggregate reports are much better tools because instead of being overly focused on the minutiae of mail to one mailbox at one provider, domain owners can focus on the bigger holistic view of their entire mail sending program. 

With DMARC:

Senders can receive DMARC aggregate reports that aggregate data on the authentication information for every email sent using their domain. 

Senders can also request a class of handling for a message that fails authentication.  However, enforcement is a critical component of DMARC and as of now, only 13% of DMARC users are at enforcement. Without it, receivers are not provided with directions on how to handle a message that fails authentication, meaning spoofed emails can still make it into the inbox. 

For the recipient, DMARC aligns authentication results from SPF and/or DKIM with what the user sees in the “From” field of their email. 

As DMARC adoption grows, domain owners can be confident that only approved senders are using their domain, and end-users can be increasingly confident that the message in their inbox is from who it says it’s “From” without any additional digging into email headers — but we are still far from reaching optimal protection. 

Where is DMARC headed? 

The DMARC standard was released in 2012, and, in early 2020, the number of domains with published DMARC records nearly surpassed one million. This is an increase of 70% over 2019 and 180% from 2018.

Just publishing a DMARC record doesn’t sufficiently protect a domain from spoofing. Yet, of the nearly 1 million organizational domains with DMARC, only 13% are at enforcement and truly protecting domains from impersonation or bad actors. 

Today, DMARC is a standard used by 80% of the world’s inboxes and while DMARC interest continues to grow, expertise isn’t keeping the same pace.

What comes next? 

Close the gap between published records and enforcement

DMARC contains subtleties that are tricky and tedious for most companies to implement. What’s more, it relies on two other standards, SPF and DKIM, which are themselves tricky to implement and error-prone. 

We’ll likely see a shift to more direct information about the technical aspects of DMARC. Already, free tools exist to overcome the often-complicated first step of a DMARC initiative that would typically require manual XML report analysis. 

Providing domain owners access to DMARC visibility without the technical burden is just the first step in making DMARC enforcement accessible for everyone.  

No Auth, No Entry?  

The question on many people’s minds: Will DMARC ever be required? In January 2018, the Department of Homeland Security required federal agencies to implement DMARC on email-sending domains under the BOD 18-01 directive but a government mandate for other industries is unlikely. 

However, you may have heard the term “No Auth, No Entry.”  No Auth, No Entry refers to a possible future where one or more mailbox providers choose to enforce a policy of refusing any mail that is not authenticated. While there has yet to be a public commitment, domain owners can still reap the benefits of DMARC now and be prepared if this ever comes to fruition. 

Leverage DMARC as a foundational element of future email features

DMARC opens doors for other security standards and specifications benefitting all teams from IT to marketing. One example is Brand Indicators for Message Identification (BIMI), the new email specification enabling brand logos to display within supporting email clients. To be eligible for BIMI (and get the 10% increase in email engagement that comes with it), a company’s DMARC policy must be at enforcement. 

Forrester estimates a typical, large enterprise can save $2.4 million per year with a DMARC policy at enforcement. Organizations need DMARC to protect email security, company reputation and customers, to increase customer engagement and to save money. DMARC isn’t going away and it will be further prioritized in the coming years.

TOPICS

Peter Goldstein, chief technology officer and co-founder, Valimail.

Read more
The best email hosting services: Dreamhost, Zoho, Scalahosting, Bluehost and Hostinger's logo on a desktop screen on a purple background
Best email hosting services of 2025
Hands typing on a keyboard surrounded by security icons
Your passwords aren't the key to protecting your online identity, your email address is
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Paper craft illustration of a suspicious email that contains a snake
How to spot a phishing email
Security padlock in circuit board, digital encryption concept
MFA alone won’t protect you in 2025: the new cybersecurity imperative
Representational image of a shrouded hacker.
Getting to grips with Adversary-in-the-Middle threats
Latest in Software & Services
TinEye website
I like this reverse image search service the most
A person in a wheelchair working at a computer.
Here’s a free way to find long lost relatives and friends
A white woman with long brown hair in a ponytail looks down at her computer in a distressed manner. She is holding her forehead with one hand and a credit card with the other
This people search finder covers all the bases, but it's not perfect
That's Them home page
Is That's Them worth it? My honest review
woman listening to computer
AWS vs Azure: choosing the right platform to maximize your company's investment
A person at a desktop computer working on spreadsheet tables.
Trello vs Jira: which project management solution is best for you?
Latest in News
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Sunday, March 23 (game #385)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Sunday, March 23 (game #651)
Google Pixel 9 Pro Fold main display opened
Apple is rumored to be prioritizing battery life on the foldable iPhone – which could also feature a liquid metal hinge for added durability
Google Pixel 9
The Google Pixel 10 just showed up in Android code – and may come with a useful speed boost
L-mount alliance
Sirui joins L-Mount Alliance to deliver its superb budget lenses for Leica, DJI, Sigma and Panasonic cameras