v2.1.0Manage Blocked IPs, Dashboard Chart Fixes, Calendar Integration & more

DNS Records

Configure your DNS records properly to authenticate your emails and ensure reliable delivery. All records are essential for email authentication and deliverability.

MX Record (Mail Exchange)

An MX record specifies which mail servers are responsible for receiving email on behalf of your domain. When someone sends an email to [email protected], the sender's mail server queries DNS for the MX records to determine where to deliver the message.

Configuration

FieldValue
TypeMX
Host@ (or yourdomain.com)
Valuemx.airsend.one
Priority10

SPF Record (Sender Policy Framework)

SPF allows domain owners to specify which mail servers are authorized to send email on behalf of their domain. Without SPF, anyone can forge emails that appear to come from your domain.

Configuration

FieldValue
TypeTXT
Host@
Valuev=spf1 include:spf.airsend.one ~all

SPF Policy Qualifiers

QualifierMeaningRecommended
~allSoft fail — accept but mark as suspiciousStart with this
-allHard fail — reject unauthorized sendersAfter confirming all sources
?allNeutral — no policy enforcedNot recommended

Example with Multiple Providers

v=spf1 include:spf.airsend.one include:_spf.google.com include:servers.mcsv.net ~all

DKIM Record (DomainKeys Identified Mail)

DKIM allows the sender to digitally sign outgoing emails using a private cryptographic key. The receiving server retrieves the public key from your DNS and uses it to verify the signature, confirming the message was not altered in transit.

Configuration

FieldValue
TypeTXT
Hostairsend._domainkey
Valuev=DKIM1; k=rsa; p=YOUR_PUBLIC_KEY_HERE

The public key is auto-generated when you add your domain. Copy it exactly from your Airsend dashboard.

Headers Signed by DKIM

FromToSubjectDateMessage-IDIn-Reply-ToReferencesMIME-Version

DMARC Record

DMARC builds on SPF and DKIM, allowing domain owners to publish a policy for how receiving servers should handle emails that fail authentication checks. It also provides reporting to monitor unauthorized use.

Configuration

FieldValue
TypeTXT
Host_dmarc
Valuev=DMARC1; p=none; rua=mailto:[email protected]; adkim=r; aspf=r; pct=100

DMARC Tags Explained

TagDescription
v=DMARC1Version identifier (required)
p=nonePolicy: none (monitor), quarantine (spam), or reject (block)
ruaAggregate report email address
rufForensic report email address
adkimDKIM alignment: r (relaxed) or s (strict)
aspfSPF alignment: r (relaxed) or s (strict)
pctPercentage of messages the policy applies to (1-100)

Recommended Rollout

  1. Phase 1: Start with p=none — monitor and collect reports without affecting delivery
  2. Phase 2: Move to p=quarantine — send failing emails to spam
  3. Phase 3: Set p=reject — block all unauthenticated emails

PTR Record (Reverse DNS)

A PTR record maps an IP address back to a hostname. When your mail server sends an email, the receiving server performs a reverse DNS lookup to verify that the IP resolves to a valid hostname associated with your domain.

How to Set Up PTR

  1. Contact your VPS or dedicated server provider (not your DNS registrar)
  2. Request a PTR record for your server IP pointing to your mail server hostname (e.g., mail.yourdomain.com)
  3. Ensure the PTR hostname has a matching A record that resolves back to the same IP
  4. This creates forward-confirmed reverse DNS (FCrDNS)