Interpreting Authentication Results
Understanding the Authentication-Results Header
This technical header shows if an email passed security checks. Think of it like an email's "security report card".
What It Checks
- ✅ SPF: Did the email come from approved servers?
- ✅ DKIM: Was the email tampered with in transit?
- ✅ DMARC: Do SPF and DKIM agree on who sent it?
How to Read the Results
Each line shows:
- Protocol: spf/dkim/dmarc
- Result:
- 🟢 pass = good
- 🔴 fail = warning
- 🟡 neutral = inconclusive
- ⚪ none = not checked
- Domain: Which organization's rules were checked
Examples
Example: Good Email
Authentication-Results: gmail.com;
dkim=pass header.d=paypal.com;
spf=pass smtp.mailfrom=paypal.com;
dmarc=pass (p=reject) header.from=paypal.com
✅ All checks passed for paypal.com
Example: Phishing Attempt
Authentication-Results: gmail.com;
dkim=fail header.d=scam.com;
spf=fail smtp.mailfrom=scam.com;
dmarc=fail (p=reject) header.from=paypal.com
🔴 Claims to be PayPal but failed all checks!
Common Scenarios Explained
-
SPF pass + DKIM fail
- Possible spoofing - sender faked the domain
- Example: Shows "From: bank@example.com" but signature is invalid
-
DKIM pass + SPF fail
- Often means legitimate forwarding
- Example: Work email forwarded to personal account
-
DMARC fail
- Strong phishing indicator
- Especially dangerous if combined with other failures
🔍 Pro Tip: Look for mismatches between the header.from domain and the authentication domains.
⚠️ Warning: Some legitimate emails may fail checks - always consider the context.