You hit my passion point.
Your are half right. SPF Pass does not require action and SPF non-Pass is not immediately actionable. However, authentication failure is in an alarm that tells you to collect more information. The problem is that most spam tools do not provide the tools you need to manage authentication, so people give up.
The typical scenario:
You start with "Block on SPF FAIL", because you want to prevent impersonation. Then you get a false positive because
Example.com has messed up their SPF record. To fix this, your tool requires you to whitelist the
Example.com domain. Now if an attacker impersonates Example.com, he not only gets past the authentication filter, he also gets past the content filter. In an attempt to protect your network from impersonation, you have to create a security hole that facilitates impersonatiom. This makes no sense, so you turn off SPF checking. The problem is not authentication; the problem is the lousy tools from people who want our money and claim to be experts.
Here's the correct solution:
If
Example.Com throws a false positive, you create a local policy record that provides alternate authentication:
"If the server domain is
Outlook.com, and the server name is verified by fcDNS, and the SMTP Mail From domain is Example,com, then the message is treated equivalent to SPF Pass".
Now you have distinguished
Example.Com from the impersonators, increased the trust score for legitimate messages from Example.com, and blocked anyone attempting to impersonate Example.com.
Anything that needs whitelisting MUST be authenticated, but any message MAY need whitelisting, regardless of sender sophistication, so you NEED the ability to configure alternate authentication on ANY legitimate messages. But if you CAN do that on ANY message, you SHOULD do it on EVERY message.
The first step in the process is to build tools to handle the exceptions. Then you can start sending unauthenticated messages to quarantine. Once there, you have to figure out if the correct response is an alternate authentication rule or a block rule, but you only have to do decide once. The type of SPF Failure does not matter, any message without Pass is possibly a malicious impersonation, and we are paid to keep that threat from getting through our filters.
The same principle applies to authentication of the From address. DMARC is harmful if you only block impersonation when the other domain owner gives you permission to do so. You are responsible for your network security, not them.