Blog article

DMARC alignment issues overview:
A DMARC alignment failure means the domains authenticated by SPF and DKIM don’t match the visible “From” domain. This page explains how to identify DMARC alignment issues and fix them.
Sendmarc shows you exactly which senders are failing alignment and why – so you can fix issues before moving to enforcement.
DMARC doesn’t just check whether SPF or DKIM passes. It also checks whether the authenticated domain aligns with the visible “From” domain – the address the recipient sees in their email client. This is called identifier alignment.
For a message to pass DMARC, at least one of the following must be true:
d= tag matches the “From” domain.A message can pass SPF and DKIM and still fail DMARC if neither ties back to the “From” domain in the header.
DMARC aggregate reports (RUA) provide authentication results for all emails processed by receiving servers. They are delivered as XML files to the address specified in the rua= tag of your DMARC record.
Each report includes a breakdown for every sending source, showing the SPF result, DKIM result, and the policy applied. The fields to focus on are:
<spf> – Whether SPF passed or failed<dkim> – Whether DKIM passed or failed<disposition> – What action was taken on the message: p=none, p=quarantine, or p=reject<source_ip> – The sending IP address – use this to identify which source generated the trafficLook for sending sources with consistent alignment failures across multiple messages. Isolated failures may be transient. Recurring failures from the same source IP indicate a misconfigured sender that needs to be fixed before you move to enforcement.
Most DMARC alignment issues trace back to one of three configuration issues. Identifying the correct cause determines the fix.
Work through these steps in order. Do not move your DMARC policy to p=quarantine or p=reject until you have confirmed that all legitimate senders are aligned.
include: mechanisms. Confirm the Return-Path domain matches your “From” domain, or shares the same organizational domain if you’re using relaxed alignment.Moving to enforcement without confirming alignment will cause legitimate messages to be blocked or filtered. Repeat this process for each failing sender identified in your aggregate reports.
Fixing individual alignment issues is one part of email authentication. As your sending environment grows – with additional business units, SaaS tools, and regional platforms – alignment gaps will reappear without continuous monitoring and governance.
Sendmarc’s enterprise DMARC solution provides teams with:
Sendmarc takes you from initial visibility to full enforcement, across all your domains.