Blog

What Marketo users need to know about Gmail and Yahoo’s new email authentication requirements

Nicole Merlin

By Nicole Merlin

·

Published Jan 10, 2024

Illustration of a matrix-like environment where emails labelled as spam are approaching an inbox.

No doubt you’re already busy with the new sender requirements that are coming into force at Gmail and Yahoo starting in February 2024. If you haven’t already, be sure to review all the official guidance from both Gmail and Yahoo to ensure you’ll be ready.

The requirements fall roughly into two categories: sender best practices to keep spam rates low, and technical authentication requirements.

The main technical requirements will be our focus in this article.

If you’ve read through them, you will have noticed that some of the requirements seem to be aimed at the organizations like Adobe who actually run email sending platforms like Adobe Marketo Engage, while some are aimed at the people who use those platforms — and they’re all jumbled up together.

If you’re a Marketo user, how do you know which changes actually apply to you, and which changes are Marketo’s responsibility?

In this article we’ll go over the major authentication and technical requirements, what they mean, and most importantly, who is responsible.

But first up, there are a few key concepts that are important to know about. Before we dive in, we’ll go over them.

Please note: This guide is not exhaustive but is designed to complement the official guidance, so be sure to use the requirements from both Gmail and Yahoo as your official checklists for the change.

Before we begin: key concepts to know

Bulk senders according to Gmail and Yahoo

Gmail says a “bulk sender” is any domain in the “From:” address that sends 5,000 messages a day to recipients at gmail.com and googlemail.com addresses.

Yahoo defines it as “an email sender sending a significant volume of mail”. They specifically state, “we will not specify a volume threshold.”

Message header

When reading the requirements there are a lot of mentions of the ‘message header’.

This is not the top banner in your email’s design, nor is it even the <head> element in the HTML document. The message header is at the top of the outer wrapper of the entire email. It contains all the sender and receiver information, the plain text version, and the HTML version of your email.

You don’t see the message header unless you go looking for it, which you can do in Gmail by going to the three-dot menu on the top right of a message and clicking ‘Show Original’.

A drop-down menu with "show original" highlighted.

You will see the ‘raw’ message, and the code at the top is all of the message header. Further down below this there will be a ‘part’ with your plain text email, and then a part with your email’s HTML.

Image of the raw message code.

The message header is indicated at the top of this code.

‘From:’ address

When Gmail and Yahoo are talking about the ‘From:’ address, they mean this one which can be seen marked as such in the inbox:

Sender information highlighting the "from" address.

It’s the “From Address” field when creating an email in Marketo:

Highlighting the "from" address in Marketo.

‘Return-Path’ address

This is not the same as the ‘From:’ address above. This is the email address that actually sends your message, and the address that would receive any bouncebacks. Gmail sometimes calls this the ‘Envelope sender address’.

A recipient does not usually see the Return-Path address, unless they inspect the sender details more closely.

It is the mailed-by heading shown here in Gmail on our example from Apple:

Image highlighting the "mailed-by" address.

And if we open the Message Header again, you can find it in the message code:

Code with "return-path" address highlighted.

Branded and non-Branded Return Paths at Marketo

We’ll cover this in more detail below, but Marketo offers both Branded and non-Branded Return Paths, and you will be using one or the other.

If you have a non-Branded Return Path setup on Marketo, your Return-Path address is an address that ends in mktomail.com.

If you use a ‘Branded Return Path’ with Marketo, your Return-Path address will be a subdomain on your organization’s domain which was configured by Marketo and your Marketo instance administrator.

Read more at Marketo about Branded Return Path (envelope_from) on Shared or Trusted IPs and Branded Return Path (envelope_from) on Dedicated IPs.

The Gmail and Yahoo bulk sender requirements for Marketo users

SPF (Sender Policy Framework) authentication requirements

SPF authentication is all about verifying that the IP address where a message originated is actually authorized to send mail from the sender’s address. For SPF, the ‘sender’s address’ is the Return-Path address. To verify SPF authentication, mail receivers like Gmail and Yahoo look up the domain in the Return-Path address and seek out an SPF record (a type of DNS record) on that domain which authorizes the IP address which actually sent the email.

The SPF requirement may be Marketo’s responsibility, or it may be your organization’s, depending on whether you use a standard or a Branded Return Path with Marketo.

You can quickly check to see the Return-Path domain of your emails in Gmail by clicking the small arrow next to the sender name. It’s labeled ‘mailed-by’:

image with "mailed by:" line highlighted.

If this ends in mktomail.com then you are on a standard Return Path. If it contains a custom domain related to your organization, you are on a Branded Return Path.

SPF on a Marketo standard Return Path

Marketo’s standard Return-Path addresses are subdomains ending mktomail.com, for example em-sj-77.mktomail.com. For this example, SPF authentication would look up em-sj-77.mktomail.com and seek out an SPF record approving the sender IP address.

Marketo publishes SPF records on its domains authorizing all of its own IP addresses, so this will exist, and SPF will pass authentication.

You can see this result in the message header:

Image of message header displaying SPF/IP data.

You can see further detail if you dig into the message header and search for spf=pass:

Image of code in message header.

SPF on a Branded Return Path

If you are on a Branded Return Path, then the mail receiver will seek out the Return-Path domain, like news.yourdomain.com, and look for an SPF record there which authorizes Marketo’s sending IP addresses. As above, you can see this result by viewing any email’s Message Header in Gmail.

This is likely managed by your network administrator in conjunction with your Marketo instance administrator and Marketo.

Marketo’s instructions for setting up a Branded Return Path on either shared or trusted IPs or dedicated IPs also include the instructions for configuring SPF at the same time.

Marketo also provides general instructions for configuring SPF here.

SPF Alignment and DMARC

The above relates to the requirement for SPF authentication. There is an additional requirement that may apply to you for SPF alignment. See the table below for an explanation of the difference and our section on DMARC for more information.

DKIM (DomainKeys Identified Mail) authentication requirements

DKIM is a system for proving that emails belong to the organization that they claim to belong to. It has two parts: a digital signature that goes out on every email which declares a ‘parent’ web domain, and a DNS record on that domain with a matching signature that confirms the two are an authentication pair.

This means there are two parts to setting up DKIM: configuring Marketo to include the correct digital signature on every sent email, and ensuring the correct DNS record is configured on the web domain.

You may be using a shared DKIM signature or a custom DKIM signature.

When editing an email, Marketo displays a small key icon in the ‘From:’ address field which reflects whether the domain you have entered in the email address is set up with a custom DKIM signature in Marketo or not:

Image of Marketo's small key icon.

If you are using a custom DKIM signature, the key icon will be green:

Marketo's green key icon.

If you have not configured a custom DKIM signature

Marketo does automatically sign all outbound mail with a ‘shared Marketo DKIM signature’ which references their sender domain, e.g. mktomail.com, which is also the domain where their corresponding DKIM record is stored. This enables a DKIM authentication pass for mktomail.com.

You can see the DKIM domain in the sender dropdown in Gmail, where it’s marked as ‘signed-by’:

Sender dropdown info highlighting the "mailto" information.

However relying on Marketo’s DKIM is not ideal, because when you write an email address at your organization’s domain into the ‘From:’ field in Marketo, the received message in Gmail will say that it is from “you@yourcompany.com via mktomail.com” because yourcompany.com and mktomail.com are different:

Image displaying how "yourcompany.com" and "mktomail.com" are different.

Additionally, this setup will be problematic when it comes to the DKIM alignment requirement (which we discuss in the DMARC section below) because of the fact that mktomail.com is not related to the domain in your ‘From:’ address, meaning they do not ‘align’.

It is best to ensure DKIM alignment, not just so it looks a little better in the inbox, but also as it’s one of the simpler ways to meet the new requirements, even for bulk senders.

Using a custom DKIM signature

To set up a DKIM signature that references your domain, you need to set the DKIM record up on the domain you want to use in your ‘From:’ address, and then configure Marketo to send out a copy of the matching digital signature on every email that they send for you.

As the DKIM record lives on your domain, it would typically be managed by your network administrator. To configure the DKIM key in Marketo, check out their guide to setting up a custom DKIM signature in Marketo.

DKIM Alignment and DMARC

The above relates to the requirement for DKIM authentication. There is an additional requirement that may apply to you for DKIM alignment. See the table below for an explanation of the difference and our section on DMARC for more information.

DMARC: Domain-based Message Authentication, Reporting & Conformance requirements

Gmail’s requirement

For all senders

None

For bulk senders

You must set up a DMARC policy, no enforcement is fine.

Also see additional DMARC alignment requirements below.

Yahoo’s requirement

For all senders

None

For bulk senders

Publish a valid DMARC policy, no enforcement is fine.

Also see additional DMARC alignment requirements below.

DMARC allows you to declare the levels of SPF and DKIM authentication that you are committed to, as well as what email receivers should do with messages that don’t meet those levels.

Marketo has published guidelines for complying with DMARC here. Gmail also links to some helpful generic information on DMARC which helps explain some of the core concepts, like the different enforcement policy levels.

In terms of actually adding the DMARC record, this step is fairly simple, as both Gmail and Yahoo are happy for you to set an enforcement policy of “none”, which has no real effect on anything. The DMARC record itself is another DNS record, and as such it would typically be set up by your network administrator on your organization’s web domain.

You can see if a message is passing DMARC in Gmail by viewing the Message Header. Here is where you will see a report of all the authentication. In this example we can see a pass with flying colors from Apple:

An example of a DMARC "pass" from Apple.

Arguably the tricker part is DMARC alignment, which we’ll go over below.

Passing DMARC with Alignment

To be compliant as a bulk sender, you also need to ‘pass’ DMARC on the basis of either DKIM or SPF alignment.

For the purposes of alignment, DMARC will check the ‘From:’ address and how closely it matches the domain used for SPF or DKIM.

Gmail also states that to fully pass DMARC you must either:

  • Pass SPF Authentication and SPF Alignment, or
  • Pass DKIM Authentication and DKIM Alignment.

Below is a table that summarizes the differences between the authentication and alignment requirements for SPF and DKIM:

Measure

SPF authentication

What it checks

The [Return-Path] domain + the IP address that the message is from

What it checks against

The SPF record stored on the [Return-Path] domain

Pass result

The SPF record authorizes the IP address that the email originated from

Fail result

There is no SPF record containing the IP address that the email originated from

Measure

SPF alignment

What it checks

The [Return-Path] domain

What it checks against

That the domain matches the domain in your “From:” address on the email

Pass result

The domains match

Fail result

The domains do not match

Measure

DKIM authentication

What it checks

The [d=] domain inside the DKIM signature which is added by Marketo on send

What it checks against

The DKIM key stored on the domain that matches the domain set in the [d=] of the key in the email

Pass result

They are a matching pair

Fail result

They are not a matching pair

Measure

DKIM alignment

What it checks

The [d=] domain in the DKIM signature

What it checks against

That the domain matches the domain in your “From:” address on the email

Pass result

The domains match

Fail result

The domains do not match

Gmail also shared some helpful explanations of alignment with examples.

The simplest way to be compliant

If you use a standard Return Path at Marketo, the simplest way to meet the bulk sender requirements if you haven’t already, is to simply ensure you set up a custom DKIM Signature for the web domain that you use in your ‘From:’ address.

Since Marketo implements SPF for mktomail.com, you will pass SPF authentication. And even though you don’t have SPF alignment, you will have both DKIM authentication with DKIM alignment, thus meeting all the requirements.

If you use a custom Return Path, then you will also achieve SPF alignment as long as you use the Return-Path domain as your ‘From:’ address domain.

And while having both is not yet a requirement, it’s worth noting that Google states, “it’s likely that DMARC alignment with both SPF and DKIM will eventually be a sender requirement.”

It’s a great idea to start thinking about this now, as it could take some time to set up a Branded Return Path if you don’t have one already.

One-click unsubscribe requirement

Gmail’s requirement

For all senders

None

For bulk senders

Must comply with RFC8058

Yahoo’s requirement

For all senders

None

For bulk senders

Implement a List-Unsubscribe header, RFC8058 highly recommended

Confusingly, this is not the unsubscribe link in the visible message, and it’s not about tokens or any other unsubscribe mechanism that you add to the normal visibly ‘body’ of your emails (though there are recommendations about those aspects — be sure to review both both the Gmail and Yahoo guidelines for these).

This requirement specifically refers to a hidden mechanism that is embedded in the Message Header. Email clients like Gmail or Yahoo can seek out this mechanism and turn it into Unsubscribe links that appear in the interface, like this one at the top of the message in Gmail:

An example of how data is turned into an "unsubscribe" link.

Complying with particular requirements is definitely Marketo’s responsibility, and they currently add a type of these headers to all commercial messages on send (they won’t show up on transactional emails like receipts, and may not display on tests or samples).

However while Marketo’s current implementation means they are compliant with Yahoo’s requirement for bulk senders, they are not quite compliant with Gmail’s bulk sender requirements… yet.

Gmail’s bulk sender requirement is to conform to the standard known as RFC 8058. As per RFC 8058, a true ‘One-click unsubscribe’ setup looks like this, with an HTTPS address as the unsubscribe mechanism:

List-Unsubscribe: https://example.com/unsubscribe/functionality

List-Unsubscribe-Post: List-Unsubscribe=One-Click

Marketo currently embed a simpler one-line ‘List-Unsubscribe’ using a mailto address as the mechanism, looking a little like this:

List-Unsubscribe: mailto:abc123@unsub-abmktomail.com

As per Marketo’s official guidance here, they are still in the process of meeting this requirement.

“For Marketo Engage, Adobe … does not currently support the “http/URL” option. Further updates on that to come.”

We contacted Marketo about this, and they recommended bookmarking the post and checking back regularly for updates.

Gmail’s FAQs on the topic actually says that, “senders that already include an unsubscribe link in their messages have until June 1st 2024 to implement one-click unsubscribe in all commercial messages.” It’s unclear whether they are referring here to a visible link in the body of the email, or a simpler List-Unsubscribe header, but either way it sounds like Marketo likely have until June 1st to comply with this one.

Processing time for unsubscribes

Yahoo requires that bulk senders honor unsubscribes within 2 days, while Gmail places an emphasis on one-click unsubscribe for bulk senders, which should be immediate.

Marketo states that even with their current method, they already process unsubscribes instantly, so they are compliant with this requirement.

Custom unsubscribe configurations

If you have any custom unsubscribe flows that aren’t using the standard Marketo implementation then be sure to refer to the official guidance from both Gmail and Yahoo and make sure they are all compliant with the new rules.

PTR Records, aka Reverse DNS Records

We contacted Marketo regarding PTR records and they confirmed that they do publish PTR or Reverse DNS records for all the IP addresses that they manage.

Monitoring your IP Address/es

Gmail suggests that you use their tools to monitor reputation on shared IPs. And while it’s not a technical requirement, both Gmail and Yahoo suggest that you segregate email types by IP address or DKIM domain.

The responsibility for all these requirements can depend on whether you use a shared or dedicated IP. If you remain on a shared IP then this remains Marketo’s responsibility, if you are on a dedicated IP then some of these requirements will fall on your organization’s shoulders.

Use a TLS connection for transmitting email

Gmail’s requirement is that TLS be used for all senders. According to Marketo’s Security Overview whitepaper, they are compliant with this requirement from Gmail. The white paper states:

“Marketo Engage uses HTTPS TLS v1.2 to protect data in transit.”

Refer to page 6 of the Adobe® Marketo Engage Security Overview for more information.

Wrapping up

We hope this guide has helped to clarify some of the key technical requirements for bulk senders that Gmail and Yahoo are introducing in 2024, as well as what they mean for you and your team as Marketo users.

As always, things can change fast, so be sure to bookmark Marketo’s official guidance and check back regularly for any changes from them. Likewise, we have already seen quite a few updates to the official guidance from both Gmail and Yahoo so be sure to keep a keen eye on those too.


Share this article

Nicole Merlin

Author

Nicole Merlin

Head of Email Strategy and Development, Knak

Why marketing teams love Knak

  • 95%faster speed to market

  • 22 minutesto create an email*

  • 10K+marketers using Knak

* On average, for enterprise customers

Built by marketers, designed for everyone

Discover the future of no-code email and landing page creation.

See it in action