Spoofed Emails & Trusted Senders/Trusted Domain
Question asked by Brian - 3/17/2026 at 2:34 PM
Unanswered
Forgive me if this is a stupid question:

I have a trusted domain (e.g., xyz.com).

I receive an email being spoofed where the from address and return-path is xyz.com. However, the email should fail DMARC because the email is not actually from an authorized xyz.com IP address.

Why does this email still end up in the inbox?
Derek Curtis Replied
Employee Post
Hard to say without reviewing the SMTP logs. Does the header show it passing SPF, DKIM, and DMARC?
Derek Curtis CCO SmarterTools Inc. www.smartertools.com
Brian Replied
It was ending up in the inbox when I dumped the .eml into Spool/Drop. However, the original did end up in  a SPAM folder.

X-SmarterMail-Spam: Reverse DNS Lookup [ForwardMismatch]: 5, SPF [None]: 1, DMARC [failed]: 0,
Null Sender: 0, HONEYPOT [passed]: 0, Cyren [Unknown]: 0, CyrenIP [LOW]: 0,
Message Sniffer [code:53]: 21, DKIM [None]: 1, _ARC: none, HostKarma -
Whitelist: 0, Spamhaus - SBL, Spamhaus - XBL2: 0
DMARC is enabled on AntiSpam Options. Quarantine/Suspicious Weight:30, DMARC Fallback Policy: Reject.

Is there a way to have DMARC Fail add to the SPAM weight? or reject a failed DMARC altogether?
Derek Curtis Replied
Employee Post
As I understand it, DMARC is a sender policy. As such, there's only so much SmarterMail can do. We can score if the policy is set to quarantine, or if DKIM and/or SPF fails (suspicious), but if the sender sets their policy to "None" they they're simply monitoring, there's no enforcement action.

You could adjust SPF and DKIM fail weights to try and circumvent the DMARC none "fail". 
Derek Curtis CCO SmarterTools Inc. www.smartertools.com
Douglas Foster Replied
One of the great mysteries about DMARC is why anyone cares about the sender's DMARC policy.   You should ALWAYS care whether a message is a malicious impersonation or not.   You should NEVER let your network security be influenced by the other domain's fear of false positives.   Your job is to block bad stuff and correct false positives when they occur.  So teste everything for DMARC so that you have data,  Then do your job to disposition the exceptions.

The dangerous consequences of obeying the sender's advice:
  • About 95% of all domains have a DMARC policy of NONE or no policy at all.   If you follow that policy guidance, you will accept somewhere around 95% of all malicious impersonation.  Don't do it.
  • You will also reject about 5% of your incoming mailing list messages, even when they are harmless and desired by your users.  Don't do that either.
My experience is that attackers understand DMARC perfectly, and consequently 100% of malicious impersonation uses a domain with p=none or no policy.  Yale.Edu is their favorite target.   For most people, DMARC has not removed the threat volume, it has only modified the attackers choice of what to impersonate.   Maybe people are less likely to fall for an impersonation of it is not a bank, but your job is to prevent the malicious impersonation from landing in the user's mailbox at all.   It is the one part of email filtering that can be done reliably.

- You SHOULD apply the DMARC test to every message, using relaxed alignment.  Messages that fail DMARC and fail your local policy rules should go to Quarantine.   Nothing should be rejected based on DMARC results alone.

- You SHOULD have a way of authenticating a message by local policy when it fails authentication but is legitimate and acceptable.   This result will happen.   The details of this are a longer spiel, but I have posted them previously.

- You should NEVER whitelist a domain without some form of verification for that domain.   If you do, you are also whitelisting an attacker that chooses to impersonate your whitelisted domain.   Since any domain may need to be whitelisted, you need a way to provide alternate authentication for any message that does not authenticate automatically.

These are strategies that flow directly from your filtering needs.  IETF does not try to define the part of the solution that involves local policy, so the effect of their specification is to protect brand image while harming recipients.   Even the brand owner is a recipient, so the harm is universal.

Based on a lot of experience, it has been sufficient to require SPF PASS or DMARC PASS based on a signature.    The messages that produce SPF Pass with unaligned From addresses are typically from email service providers or mailing list.  Why is this sufficient?   If an attacker is using an environment that allows him to impersonate the From address, he can probably impersonate the Mail From address as well, and will.  If he is on an environment that does not allow impersonation of Mail From, he probably cannot impersonate the From address either.   There are exceptions, but creating an exception for every email service provider has not proven to be a priority.

Unfortunately, you cannot create this type of solution with SmarterMail, you have to use something that can be customized.  I use Declude.   For new implementations, use Declude Reboot or rSpamD or PostFix.

Reply to Thread

Enter the verification text