Email Servers
--
Questions
--
Followers
Top Experts
Zero AI Policy
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
I expect dmarc is working as it should
That's an awfully large volume, which could be in part due to a issue on your end.
Are you receiving and reviewing DMARC reports from receiving servers?
If not, you should.
dmarcian has a XML to Human converter to help you read the reports
https://us.dmarcian.com/xml-to-human-converter/
You might even want to consider signing up






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Based on the report you produced, DMARC is working exactly as it should. Some site(s) are sending forged email on behalf of your site, at larger than normal volume, so you'll see a jump in DMARC reports.
That is if the problems really are real threats.
Many brain dead systems (Infusionsoft is the worst) tend to constantly add new sending IP ranges to their infrastructure without adding these new IP ranges to their internal SPF records, which can cause a massive spike in rejected mail till the SPF record is fixed, which can take a very long time.
For best assistance, provide 30 days of DMARC aggregate reports for analysis, or you can run these through some online tool... like Dmarcian's DMARC parser for more info.
Checking for broken mailing systems is fairly easy. Look for IPs which fail SPF at 100% + pass DKIM at 100%, which is an indication some broken mail system has started sending email out some IPs which don't occur in their SPF record.
The way I fix this is to process DMARC forensic reports which generate every 1-2 hours (for most Mailbox Providers), then test the failing IPs + for IPs which are missing from the SPF records, I host my on SPF record... say for Infusionsoft... then continually add IP net blocks on a realtime basis whenever this problem occurs... generally several times/month...
Additionally we have Messagelabs wrapped around O365. Our emails are always signed and aligned for both spf and dkim. I have reported to ML and had confirmation that all their external IP's are including in there SPF. As for as checking the failed IP’s, these are pretty much all coming from some sketchy countries.
If this wasn’t an external spam campaign using my domain, is there any way dmarc could be exploited or misinterpreted to generate information like this? If not I guess this is genuine and there isn’t anything I can do about it. Also, is it worth modifying the dmarc record to reject now? There is no possibility that our domain is used anywhere outside of our tenant for legitimate reasons. I have left it at quarantine because reports of spoofing were always low but I think it might be appropriate to reject now.
Better to look at your DMARC reports to see if...
1) DMARC is correctly reporting forgery attempts. If this is true, then DMARC is working.
2) DMARC is reporting real problems like Infusionsoft adding a range of sending IPs without adding these to their SPF records. If this is true, DMARC is working + Infusionsoft is broken. Fix: Contact Infusionsoft to fix their tech. (Good luck with this. Normally Infusionsoft will tell you they're smart + you're stupid, then just ignore your request. Be prepared for this nonsense. Also, you may have to fix this yourself as I do, by running your own custom SPF infrastructure to patch all mail sending problems.)
3) DMARC is broken. In this case, you'll fix your own SPF or DKIM DNS records or more likely your DKIM message signing.
Summary: Analyze your DMARC records to determine which of #1-#3 is occurring, then take action.
Tip: Email is far more complex than most people imagine. It's a wonder any email gets delivered at all. If you can't figure out which of #1-#3 is occurring, then best to hire someone familiar with this type of debugging... as DMARC debugging is complex + tedious.
Above: As I said above...
For best assistance, provide 30 days of DMARC aggregate reports for analysis, or you can run these through some online tool... like Dmarcian's DMARC parser for more info.

Get a FREE t-shirt when you ask your first question.
We believe in human intelligence. Our moderation policy strictly prohibits the use of LLM content in our Q&A threads.
DMARC works differently than this.
DMARC suggests to Mailbox Providers how stringently they should enforce SPF + DKIM failures.
No mail recipient will every interact with a mail message based on any DMARC setting, only Mailbox Providers.
Said other way, only Google operates on DMARC settings, never Google users like foo@gmail.com or any other Gmail user.






EARN REWARDS FOR ASKING, ANSWERING, AND MORE.
Earn free swag for participating on the platform.
Email Servers
--
Questions
--
Followers
Top Experts
Within Internet message handling services (MHS), a message transfer agent or mail transfer agent (MTA) or mail relay is software that transfers electronic mail messages from one computer to another using a client–server application architecture. A MTA implements both the client (sending) and server (receiving) portions of the Simple Mail Transfer Protocol (SMTP). The terms mail server, mail exchanger, and MX host may also refer to a computer performing the MTA function. The Domain Name System (DNS) associates a mail server to a domain with mail exchanger (MX) resource records containing the domain name of a host providing MTA services.
