⚡ Cold Email Guide

Cold Email Deliverability: SPF, DKIM, DMARC Setup Guide

April 26, 2026 · 10 min read

You've written the perfect cold email. The subject line is intriguing, the copy is tight, and the call-to-action is clear. You hit send.

And it lands in spam.

The problem isn't your copy — it's your email authentication. Without proper SPF, DKIM, and DMARC records, inbox providers treat your messages like phishing attempts. Here's what each protocol does and how to set them up right.

What SPF Does (And Why It Matters)

SPF = Sender Policy Framework. It's a DNS record that tells receiving servers: \"These are the only servers allowed to send email on behalf of my domain.\"

When your email hits a recipient's server, it checks your SPF record. If the server sending the email isn't on your approved list, the message is flagged or rejected.

What an SPF record looks like

v=spf1 include:_spf.google.com ~all

This says: \"Only Google's servers are authorized to send for this domain.\" The ~all means \"softfail\" — non-listed servers get flagged but not rejected. Use -all for strict rejection.

For cold email: If you send from multiple providers (your main mail server + a cold email tool), your SPF record must include all of them. Each include adds to your DNS lookup count — stay under 10 to avoid authentication failures.

What DKIM Does (And Why It Matters)

DKIM = DomainKeys Identified Mail. It adds a cryptographic signature to your emails that proves the email wasn't modified in transit and confirms it really came from your domain.

Your sending provider generates a public/private key pair. The private key signs outgoing emails; the public key lives in your DNS as a TXT record. The receiving server uses the public key to verify the signature.

What a DKIM record looks like

v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA...

This is a 2048-bit public key. Your email provider generates and hosts the private key — you only publish the public half in DNS.

For cold email: Every sending domain needs its own DKIM signature. If you're sending cold email from a dedicated sending domain (e.g., outbound.yourcompany.com) rather than your primary domain, that domain needs its own DKIM record too.

What DMARC Does (And Why It Matters)

DMARC = Domain-based Message Authentication, Reporting & Conformance. It ties SPF and DKIM together and tells receiving servers what to do when authentication fails.

DMARC has three policy levels:

What a DMARC record looks like

v=DMARC1; p=quarantine; rua=mailto:dmarc-reports@yourdomain.com; pct=100

This tells receivers to quarantine anything that fails SPF/DKIM, and send aggregate reports to your inbox. Start with p=none, monitor for 2–4 weeks, then tighten to quarantine or reject.

Get IronMail updates

We'll email you when we launch. No spam, ever.

The Three Mistakes That Kill Cold Email Deliverability

How IronMail Handles Email Authentication Automatically

Setting up SPF, DKIM, and DMARC manually requires DNS access, technical knowledge, and ongoing maintenance. IronMail handles it for you:

Good deliverability starts before you write the first line of copy. Authentication is the foundation — get it right and your cold emails have a fighting chance.

Stop worrying about spam filters

IronMail handles SPF, DKIM, and DMARC automatically — so you can focus on outreach, not DNS records.

See Pricing →

Stay in the loop

Get IronMail updates — we'll email you when we launch new features.