Blog

Why Email Forwarding Breaks DMARC (And What You Can Do)

Email forwarding is the most common cause of legitimate DMARC failures. Learn why it happens and how to handle it.

Published December 15, 2025
dmarc email-forwarding spf dkim troubleshooting
How email forwarding affects DMARC authentication

Email forwarding breaks DMARC because it changes the envelope sender and often modifies the message. SPF fails because the forwarding server isn’t in your SPF record. DKIM fails if the forwarder alters the message body. With both failing, DMARC fails—even though the original email was legitimate.

This is the most common cause of unexpected DMARC failures, and it’s largely outside your control. Understanding why it happens helps you interpret your reports correctly and set realistic expectations.

How Email Normally Works

Before forwarding enters the picture:

  1. You send email from [email protected]
  2. Your server is in your SPF record ✓
  3. You sign with DKIM for company.com
  4. The recipient’s server checks SPF and DKIM
  5. Both align with the From address
  6. DMARC passes ✓

What Happens When Email Gets Forwarded

Here’s where it breaks down:

  1. You send email to [email protected]
  2. Your email passes SPF and DKIM at University’s server
  3. Colleague has forwarding set up to [email protected]
  4. University’s server forwards the email to Gmail
  5. Gmail receives email claiming to be from [email protected]
  6. …but it came from University’s server (not in your SPF)
  7. SPF fails—University’s server isn’t authorized for your domain

If DKIM survives, you might still pass DMARC. But often:

  1. University’s server adds a footer: “Forwarded from university.edu”
  2. This modifies the message body
  3. DKIM signature is now invalid
  4. DKIM fails
  5. DMARC fails—both SPF and DKIM failed

The original email was legitimate. The forwarding was legitimate. DMARC still fails.

Why SPF Always Fails on Forwarded Email

SPF checks the server that delivered the email, not the server that originated it. When email is forwarded:

  • Original delivery: Your server → Recipient’s server (SPF passes)
  • Forwarded delivery: Forwarder’s server → Final destination (SPF fails)

The forwarding server isn’t in your SPF record—and shouldn’t be. You can’t add every possible forwarding server to your SPF (you’d hit the 10 lookup limit immediately, and you don’t know which servers might forward your email).

SPF and forwarding are fundamentally incompatible. This is a known limitation of SPF, which is why DKIM matters so much. Learn more about common DKIM mistakes to avoid.

Why DKIM Sometimes Survives

DKIM signs the message content. If the message isn’t modified, the signature remains valid regardless of which servers it passes through.

DKIM survives forwarding when:

  • The forwarder doesn’t modify the message body
  • Headers included in the signature aren’t changed
  • The message isn’t re-encoded

DKIM breaks when forwarders:

  • Add footers (“Sent via University Mail”)
  • Modify subject lines (“[FWD]” prefix)
  • Re-encode attachments
  • Add or remove headers

Modern forwarders are increasingly DKIM-aware and try to preserve signatures, but there’s no guarantee.

Identifying Forwarding in DMARC Reports

Forwarded email has telltale patterns in your DMARC reports:

Signs of forwarding:

  • SPF fails but the IP belongs to a legitimate mail provider (not a random server)
  • The source IP is a university, ISP, or email service known for forwarding
  • You see email providers you’ve never sent to directly
  • Patterns of failures from specific IP ranges

In the raw XML, forwarded mail often looks like:

<record>
  <row>
    <source_ip>128.59.x.x</source_ip>  <!-- Columbia University -->
    <count>12</count>
    <policy_evaluated>
      <dkim>fail</dkim>
      <spf>fail</spf>
    </policy_evaluated>
  </row>
</record>

If you’re seeing failures from university IP ranges, large ISPs, or email hosting providers you don’t directly use, forwarding is the likely cause.

Verkh identifies probable forwarding patterns in your reports automatically, so you don’t have to manually research IP addresses.

What You Can Do About It

1. Accept That Some Failure Is Normal

A 100% pass rate isn’t realistic if any of your recipients forward email. When planning your policy progression:

  • Expect 2-5% of email to fail due to forwarding
  • Don’t let forwarding failures prevent you from reaching p=reject
  • Focus on fixing controllable failures (misconfigured senders) first

2. Make Sure DKIM Is Rock Solid

Since SPF will fail on forwarded email, DKIM is your only chance at passing DMARC. Ensure:

  • DKIM is enabled for all legitimate sending sources
  • Keys are properly configured and valid
  • You’re signing with your domain (not the third party’s domain)

If DKIM passes and aligns, forwarded email passes DMARC even though SPF fails.

3. Understand Receiver Behavior

Major email providers know about the forwarding problem. They may:

  • Apply policy less strictly to obviously forwarded mail
  • Use additional signals beyond DMARC (sender reputation, content analysis)
  • Honor ARC (Authenticated Received Chain) headers from trusted forwarders

This doesn’t mean you should ignore forwarding failures, but it does mean p=reject won’t necessarily block all forwarded legitimate email.

4. Monitor, Don’t Panic

When you see DMARC failures:

  1. Check if the source IP is a known forwarder
  2. Look for patterns (same IP range, consistent low volumes)
  3. Distinguish forwarding from actual spoofing

Spoofing attempts typically come from random IPs, in bursts, with high volumes. Forwarding shows consistent patterns from recognizable sources.

ARC: The Forwarding Solution (Sort Of)

Authenticated Received Chain (ARC) is designed to solve the forwarding problem. Each server in the forwarding chain adds its own authentication, creating a chain of trust.

The idea:

  1. You send email (SPF ✓, DKIM ✓)
  2. First forwarder validates and adds ARC signature
  3. Second forwarder validates ARC, adds its own
  4. Final receiver can trust the chain even though direct SPF/DKIM fail

The reality:

  • ARC adoption is growing but not universal
  • Not all receivers check ARC
  • Not all forwarders sign with ARC
  • It helps but doesn’t completely solve the problem

You don’t need to do anything to benefit from ARC—it’s implemented by forwarders and receivers. But don’t count on it to eliminate forwarding failures.

Forwarding vs. Spoofing: How to Tell

CharacteristicForwardingSpoofing
Source IPsKnown mail providersRandom/suspicious IPs
VolumeLow, consistentHigh, bursty
GeographyMatches your recipientsOften foreign
TimingOngoing, predictableSudden campaigns
ASNLegitimate providersHosting, bulletproof hosts

When reviewing DMARC reports, categorize failures into these buckets. Forwarding is noise to monitor; spoofing is a threat to stop.

The Bottom Line

Email forwarding will cause DMARC failures. This is a known limitation, not a configuration problem. Your job is to:

  • Ensure DKIM is properly configured (your main defense)
  • Recognize forwarding patterns in reports
  • Not let forwarding prevent policy progression
  • Focus on fixing the failures you can control

Forwarding failures don’t mean your DMARC is broken. They mean email authentication has limitations—and you’re monitoring them correctly.

For more on interpreting your DMARC reports, see our Complete Guide to Understanding DMARC Reports. When you’re ready to move beyond monitoring, our enforcement guide walks you through the progression to p=reject.


Verkh automatically identifies forwarding patterns in your DMARC reports and separates them from authentication issues you can fix. See your forwarding analysis at verkh.io.

Ready to implement this?

Verkh helps you monitor DMARC, identify issues, and reach enforcement. Start free.

Start Free