v
| SPF version. This tag is required, and must be the first tag in the
record. This mechanism must be:
v=spf1
ip4
| Authorize mail servers by IPv4 address or address range. The value must be an IPv4
address or range in standard format, for example:
ip4:192.168.0.1
or
ip4:192.0.2.0/24
|
ip6
| Authorize mail servers by IPv6 address or address range. The value must be an IPv6
address or range in standard format, for example:
ip6:3FFE:0000:0000:0001:0200:F8FF:FE75:50DF
or
ip6:2001:db8:1234::/48
|
a
| Authorize mail servers by domain name, for example:
a:solarmora.com
|
mx
| Authorize one or more mail servers by domain MX record, for example:
mx:mail.solarmora.com
If this mechanism isn't in your SPF record, the default value is the MX records of the
domain where the SPF record is used.
|
include
| Authorize third-party email senders by domain, for example:
include:servers.mail.net
|
all
| Specifies that all incoming messages match. We recommend you always include this
mechanism in your SPF record.
This must be the last mechanism in the SPF record. Any mechanism that comes after the
all mechanism in an SPF record is ignored.
Should I use ~all or -all?
When an SPF record includes ~all (softfail qualifier), receiving servers typically accept
messages from senders that aren't in your SPF record, but mark them as suspicious.
When an SPF record includes -all (fail qualifier), receiving servers may reject messages
from senders that aren't in your SPF record. If your SPF record isn’t set up correctly, the
fail qualifier might cause more messages from your domain to be sent to spam.
Tip: To prevent spoofing of domains that don’t send email, use this as the SPF
record for the domain: vspf1 ~all
| |