DMARC.wiki About

Resend logo

Resend

SPF

Resend is capable of sending SPF-aligned emails, meaning that they use your domain name in the Envelope From (or Return-Path) of email messages.

This makes it possible to achieve DMARC compliance via SPF.

When setting up a domain with Resend, you’ll be asked to create a TXT record on the send subdomain, which Resend will use as the Envelope From domain.

The SPF record should contain:

v=spf1 include:amazonses.com ~all

In addition to this, you’ll be asked to create an MX record on the same send subdomain for bounces processing.

The send subdomain is customizable: look for the Custom Return Path feature.

Source

DKIM

Resend supports custom DKIM signatures domains. This makes it possible to achieve DMARC compliance via DKIM.

Follow the authentication process and create the TXT record for the DKIM key when asked.

Source

DMARC

Resend supports DMARC compliance via both SPF and DKIM, with strict alignment on DKIM but only relaxed alignment on SPF.

Set up DMARC to:

  • Receive email delivery reports to identify and fix authentication issues and find out who’s sending from your domain.
  • Choose the action to apply when both SPF and DKIM are not aligned with your sender domain, blocking abuse attempts.

Use a DMARC monitoring tool like DMARCwise to simplify compliance and detect issues before they affect your domain reputation.

Here’s an example of a DMARC record, to be created as a TXT record on _dmarc.example.com:

v=DMARC1; p=none; rua=mailto:;

You may later strengthen the policy and change the alignment mode, but remember that in Resend:

  • The SPF domain is a subdomain of your sender domain, so you cannot use the strict SPF alignment mode.
  • The DKIM signature domain would instead match your sender domain exactly, so you may use strict DKIM alignment.
v=DMARC1; p=reject; rua=mailto:; adkim=s;

(aspf=r; for relaxed SPF is implied if left out.)

Guide to DMARC compliance

Last updated on August 27, 2025