Understanding RFC 7489
RFC 7489 defines DMARC (Domain-based Message Authentication, Reporting and Conformance), an email authentication protocol that builds upon SPF (RFC 7208) and DKIM (RFC 6376) to provide domain-level protection against email spoofing and phishing attacks.
Key DMARC Benefits
- Prevents email spoofing and phishing attacks
- Improves email deliverability and sender reputation
- Provides visibility into email authentication results
- Enables gradual deployment with policy progression
- Protects brand reputation and customer trust
DMARC Policy Implementation
1. SPF Record Setup
Ensure your SPF record is properly configured before implementing DMARC:
2. DKIM Configuration
Configure DKIM signing for your email service provider and publish the public key:
3. DMARC Record Deployment
Start with a monitoring policy and gradually move to enforcement:
Phase 1 - Monitoring (p=none)
Phase 2 - Quarantine (p=quarantine)
Phase 3 - Reject (p=reject)
RUA and RUF Reporting
RUA Reports (Aggregate)
- Daily summary reports
- Statistical overview of authentication results
- Volume and source IP information
- SPF and DKIM alignment data
- Disposition actions taken
RUF Reports (Forensic)
- Real-time failure notifications
- Individual message samples
- Detailed authentication failure reasons
- Headers and message content
- Privacy considerations apply
Compliance Best Practices
⚠️ Common Compliance Pitfalls
- Jumping directly to p=reject without monitoring
- Insufficient SPF record coverage
- Missing DKIM signatures on legitimate email
- Incorrect alignment mode configuration
- Not monitoring RUA/RUF reports regularly
Implementation Checklist
Advanced Configuration
Subdomain Policy
Configure different policies for subdomains using the sp tag:
Alignment Modes
- Relaxed (r): Allows subdomain alignment (default)
- Strict (s): Requires exact domain match
Percentage-based Enforcement
Use the pct tag to gradually enforce policy on a percentage of messages: