This is actually not a very important tip in 2015, as the email landscape has changed significantly since this post was made.
In practice, SPF is an authentication protocol, not a policy enforcement mechanism. I mean, a particular message may transmit, fail, or fail to verify SPF based on EHLO name or Return Path domain. But how should the receiver handle any SPF result to the receiver.
An email enforcement mechanism is a DMARC that defines how a message that does not transmit SPF or DKIM authentication should be processed by the recipient. Should he be completely rejected? Quarantine (usually means spam folder)? Or is it considered "normal"?
DMARC, unlike SPF, has subdomain inheritance. Thus, if a specific DMARC policy is not defined in a subdomain, the policy defined in the organization’s domain is used. Therefore, in the specific case you are referring to, the policy will reckon with _dmarc.google.com . What is:
v=DMARC1; p=quarantine; rua=mailto: mailauth-reports@google.com
So, your hypothetical email sent to support.google.com will be considered spam, even without the explicit SPF policy defined on support.google.com
So, if you want to provide subdomain spoofing for the domain you are managing, add a DMARC policy.
source share