# SPF (Sender Policy Framework)

### Introduction

> Sender Policy Framework (SPF) is an email authentication method designed to detect forging sender addresses during the delivery of the email. SPF alone, though, is limited only to detect a forged sender claimed in the envelope of the email which is used when the mail gets bounced. Only in combination with DMARC can it be used to detect the forging of the visible sender in emails (email spoofing), a technique often used in phishing and email spam.
[source](https://en.wikipedia.org/wiki/Sender_Policy_Framework)

### Description

SPF is the most basic email authentication method. It involves simple DNS records that allow you to specify what servers email can originate from for the domain specified in the [email envelope](https://www.mybluelinux.com/what-is-email-envelope-and-email-header/).

[Read More](https://open-spf.org)

### Example

As an example, `swigg.net` is setup with two SPF rules.

| Domain | Type | Value |
|--------|------|-------|
| @	     | TXT  | v=spf1 mx include:\_spf.google.com include:me.com -all |
| \*     | TXT  | v=spf1 mx:swigg.net -all                               |

These two entries can be read as follows:

1. Any email ending in `@swigg.net` has to originate from one of the MX records defined for swigg.net **or** from a Google/Apple server defined in _their_ SPF policy. Any other server sending email on behalf of this domain will be rejected.

1. Any email ending in `@*.swigg.net` has to originate from one of the MX records defined for swigg.net. Any other server sending email on behalf of these domains will be rejected.