Spammers are better at SPF, DKIM, and DMARC than everyone else

Role and Limits of SPF/DKIM/DMARC

  • Multiple commenters stress these mechanisms are for authentication and domain binding, not for blocking spam itself.
  • Main value: preventing direct domain spoofing (e.g., phishing that pretends to be from a bank/PayPal), greatly reducing convincing forged From: addresses and backscatter.
  • They don’t say whether a sender is “good”; they only assert the mail is authorized by that domain. Spammers can also correctly configure them.

Deliverability, Reputation, and Large Providers

  • People report that even with “perfect” SPF/DKIM/DMARC, new or low-volume domains often land in Gmail/Outlook spam, or are silently dropped.
  • Strong emphasis on IP reputation: residential and cheap VPS ranges are frequently distrusted; better luck with business-grade connections or reputable hosts that tightly control SMTP.
  • “Warming up” domains/IPs with gradual, consistent volumes and engagement (opens, users dragging from spam to inbox) is described as necessary.
  • Some argue providers’ behaviour looks opaque/pay-to-win; others counter that guidelines are published via industry groups and that competent “messaging admins” can avoid most issues.

Why Spammers Often Do Better

  • Spamming is a core business; they invest in getting SPF/DKIM/DMARC right for their own domains and infrastructure.
  • Legitimate orgs treat email hygiene as non-revenue overhead and under-resource it until there’s a painful incident (e.g., near-loss from CEO-impersonation scams).
  • End result: many small/medium legitimate setups are misconfigured, while spam operations are technically polished.

Operational Complexity and Internal Politics

  • Setting up DNS and keys is easy for individuals using providers like Proton/Fastmail, but hard in organizations with many siloed tools (marketing platforms, ticketing, forwarding services).
  • Marketing and sales frequently push for “whatever makes campaigns work now,” overriding cautious sysadmins; this leads to weak policies and broad allow-lists.
  • Consultants are often hired after deliverability breaks, only for their work to be undone by later careless DNS or gateway changes.

Forwarding, Strictness, and Standard Evolution

  • SPF is criticized as hostile to generic forwarding and mailing lists, since it ties authorization to IP addresses.
  • Some want strict rejection if SPF/DKIM/DMARC fail; others highlight real-world breakage from forwarding chains and middleware that rewrites headers, invalidating DKIM.
  • DMARC reports are seen mainly as a setup-validation tool; many disable them once stable.
  • There is active work on “DKIM2” and related improvements; some hope future mechanisms can let DMARC require both SPF and DKIM more safely.

Identity, Trust, and Alternative Models

  • Several participants argue reputation should be per-sender, not per-server, and that SPF/DKIM are just the identity layer underlying any such system.
  • PGP/web-of-trust and TOFU (trust on first use) are mentioned as conceptually ideal for identity transfer, but seen as far too complex for typical users.
  • Suggestions include client-side filters like “only show messages from contacts” or quarantining unknown senders until explicitly approved.

Spam Ecosystem, Abuse, and “Legitimate” Spam

  • Comments lament that WHOIS changes, CDNs, and large email/hosting platforms make abuse reporting slow and ineffective; large providers often ignore or funnel abuse reports into friction-heavy web forms.
  • Some admins now block entire high-risk countries at the network layer to reduce server noise; others note geo-IP is imperfect and can cause collateral damage.
  • Many are more annoyed by “legitimate” marketing spam (forced opt-ins, dark patterns, endless categories) than by classic criminal spam, and feel big providers do little to curb it—possibly because it aligns with their ad-driven incentives.