Skip to content

Free DMARC Alignment Checker - Fix "SPF Pass, DMARC Fail"

Check your SPF and DKIM alignment with DMARC. Understand why authentication passes but DMARC fails. See current alignment modes and get step-by-step fixes.

Takes ~10 seconds

No login required for preview No emails stored GDPR-friendly

What This Tool Checks

SPF Alignment Mode

Shows aspf setting (relaxed/strict)

DKIM Alignment Mode

Shows adkim setting (relaxed/strict)

DMARC Policy

Current enforcement level

Authentication Status

SPF and DKIM record presence

How to Fix Common Issues

SPF Passes but DMARC Fails

Configure a custom return-path domain with your email provider to align SPF:

Return-Path: bounce@mail.yourdomain.com

DKIM Passes but DMARC Fails

Configure custom DKIM signing domain with your email provider:

DKIM-Signature: d=yourdomain.com; s=selector; ...

Using Strict Alignment

For tighter security, require exact domain matches:

v=DMARC1; p=reject; aspf=s; adkim=s; rua=mailto:dmarc@yourdomain.com

How It Works

1

Enter Your Domain

Type your domain name without http:// or www

2

We Check All Records

We fetch DMARC, SPF, and probe DKIM selectors

3

Get Alignment Report

See alignment modes and fix recommendations

Frequently Asked Questions

What is DMARC alignment?

DMARC alignment means the domain in the email's From header must match the domain used in SPF or DKIM authentication. Without alignment, even if SPF/DKIM pass, DMARC will fail.

Why does SPF pass but DMARC fail?

This happens when SPF authenticates a different domain than the From header. For example, if you send via a third-party service that uses their own domain for SPF, the domains don't align and DMARC fails.

What is relaxed vs strict alignment?

Relaxed alignment (default) allows subdomains to match the parent domain. Strict alignment requires exact domain matches. Use aspf=s for strict SPF and adkim=s for strict DKIM alignment.

How do I fix DMARC alignment issues?

Configure your email services to use your domain for SPF (custom return-path) or DKIM (custom signing domain). Most ESPs support custom domain configuration for alignment.

Do I need both SPF and DKIM alignment?

No, DMARC passes if EITHER SPF or DKIM passes with alignment. However, having both provides redundancy - if one fails (e.g., forwarding breaks SPF), the other can still pass.

Understanding DMARC Alignment: The Complete Guide

DMARC alignment is one of the most misunderstood aspects of email authentication. It's the reason why your SPF and DKIM can both pass, yet DMARC still fails. Understanding alignment is crucial for achieving full email authentication and protecting your domain from spoofing.

What is DMARC Alignment?

DMARC alignment requires that the domain authenticated by SPF or DKIM matches the domain in the email's visible "From" header. This prevents attackers from using a legitimate SPF/DKIM setup on one domain to send spoofed emails appearing to come from another domain.

Think of it this way: SPF and DKIM verify that an email is authentic, but alignment verifies that it's authentic for the domain it claims to be from.

SPF Alignment Explained

SPF alignment compares two domains:

  • RFC5321.MailFrom (Return-Path/Envelope From) - The domain used for SPF authentication
  • RFC5322.From (Header From) - The visible "From" address the recipient sees

For SPF alignment to pass, these domains must match. The problem? Many email services use their own domain for the Return-Path (e.g., bounce.mailservice.com), which doesn't align with your domain in the From header.

DKIM Alignment Explained

DKIM alignment compares:

  • DKIM d= domain - The domain in the DKIM signature
  • RFC5322.From (Header From) - The visible "From" address

For DKIM alignment to pass, the DKIM signing domain must match the From header domain. Many services sign with their own domain by default, causing alignment failures.

Relaxed vs Strict Alignment

DMARC offers two alignment modes, controlled by the aspf (SPF) and adkim (DKIM) tags:

  • Relaxed (r) - Default. Allows subdomains to align with the parent domain. Example: mail.example.com aligns with example.com.
  • Strict (s) - Requires exact domain match. mail.example.com does NOT align with example.com.

Most organizations use relaxed alignment because it's more forgiving with subdomains while still providing protection.

Why "SPF Pass, DMARC Fail" Happens

This is the most common alignment issue. Here's a typical scenario:

  1. You send email through a marketing platform like Mailchimp
  2. Mailchimp uses their servers, which are in your SPF record via include:servers.mcsv.net
  3. SPF passes because Mailchimp's server is authorized
  4. But the Return-Path is bounce.mcsv.net, not your domain
  5. The From header shows you@yourdomain.com
  6. These domains don't match = SPF alignment fails
  7. If DKIM also fails alignment, DMARC fails

How to Fix Alignment Issues

The solution is to configure your email services to use your domain for authentication:

  • For SPF alignment - Set up a custom Return-Path/bounce domain. Most ESPs call this "custom envelope domain" or "branded return path." You'll add a CNAME like bounce.yourdomain.com pointing to the service.
  • For DKIM alignment - Configure custom DKIM signing. The service will give you CNAME records to add, allowing them to sign emails with your domain (e.g., d=yourdomain.com).

DKIM alignment is usually easier to configure and survives email forwarding, so prioritize it if you can only fix one.

Common Services and Alignment

Here's how popular services handle alignment:

  • Google Workspace - Automatically aligns both SPF and DKIM when sending from your domain
  • Microsoft 365 - Automatic alignment for your domain
  • Mailchimp - Requires custom domain setup for alignment
  • SendGrid - Supports custom Return-Path and DKIM domains
  • Amazon SES - Supports custom MAIL FROM domain and DKIM
  • HubSpot - Requires domain authentication setup

Testing Your Alignment

To verify alignment is working:

  1. Send a test email to a Gmail account
  2. Open the email and click "Show original" (three dots menu)
  3. Look for the authentication results header
  4. Check that SPF, DKIM, and DMARC all show "PASS"
  5. Verify the domains match your sending domain

Monitor Your DMARC Alignment Daily

Get alerts when alignment issues are detected from your DMARC reports.

Start Free Monitoring