Authenticated Received Chain (ARC)
The Importance of ARC
Email forwarding breaks SPF authentication because the forwarding server's IP address is not listed in the original domain's SPF record. This causes legitimate forwarded emails to fail DMARC, even though they were originally properly authenticated. ARC solves this by having each intermediary sign a record of the authentication state at the time it handled the message.
ARC is particularly important for mailing lists (like Google Groups, Mailman, or Listserv) that modify messages (adding footers, rewriting From headers) before redistributing them. These modifications break DKIM signatures, and the different sending IP breaks SPF. Without ARC, mailing list messages frequently fail DMARC.
Major email providers (Google, Microsoft) evaluate ARC signatures when making DMARC decisions. If a message fails SPF and DKIM but has a valid ARC chain from a trusted intermediary, the provider may accept it based on the ARC-recorded authentication results. This preserves email delivery through legitimate forwarding paths.
How to Check
ARC is implemented by mail servers, not by domain owners. You cannot configure ARC in DNS. However, checking if your forwarded emails include ARC headers helps diagnose DMARC failures for forwarded messages. Major email providers handle ARC automatically.