DMARC broke your mailing lists!

4/25/14 Update: Renamed post to “DMARC” instead of Yahoo now that Aol has their DMARC policy set to reject:

After spending sometime the last couple of days checking and rechecking my SPF settings I figured out today it was a change Yahoo made that broke message delivery to external recipients. Yahoo made this change “over the weekend” per some news articles, I first noticed NDRs dues to this on Monday 4/7/2014

The issue is that Yahoo changed their DMARC, which is made up for SPF and/or DKIM settings/policies, to “p=reject” which tells receiving email servers to reject emails from addresses that don’t originate from its servers. So if a Yahoo users sends an e-mail to and it contains recipients at @yahoo, @gmail, @msn, @hotmail,, @comcast, and many other email providers that check the original sending servers (Yahoo in the case) policy they will reject the mail. This is because the sending server of the e-mail is and not

Yahoo did this to help reduce spam that is being sent from accounts on their servers to mailing list that contains external recipients. But they basically “broke every mailing list in the world” to quote some of the many news articles I found today about this issue.

At this time there the only workaround for Exchange clients is to use the EDGE role and setup address rewrite rules. Here is an article on Using Header Rewriting with Exchange Server 2010 that should help with that.

I’m hoping Yahoo fixes this policy setting ASAP! I will update this post as I learn more!

Errors users\DL owners will see: gave this error:
Message not accepted for policy reasons. See # #SMTP# gave this error:
oFxW1n00k0D7utr0DFxXU1 Message rejected due to DMARC. Please see gave this error:
(BAY0-MC3-F11) Unfortunately, messages from ( on behalf of ( could not be delivered due to domain owner policy restrictions.

The only workarounds that I’m aware of at this time is to use an EDGE address rewrite rule to have any messages sent to a DL to have their From address to be the DLs, instead of the sending users. The other is to enable moderation on your DLs that have external recipients and for any coming from or (currently, but more will be added in the future I’m sure) resent them manually from the DL or a mailbox.

I’m hoping to hear back from some of my peers soon on better workarounds.

Good blog post on DMARC and why the rejection is happening and why this is a good thing, in general:

Yahoo’s article on their DMARC policy and how to deal with it, but doesn’t have any info on Microsoft Exchange:

Articles about this issue:

About Jason Sherry

I am a ~30 year Exchange consultant and expert. I currently work for Commvault as a Solutions Specialist for Microsoft Infrastructure For more info see my resume at:
This entry was posted in Exchange, Microsoft, Technical and tagged , . Bookmark the permalink.

6 Responses to DMARC broke your mailing lists!

  1. John R says:

    If enough people feel the pain of this, they will stop using yahoo.


  2. jasonsherry says: now has their DMARC policy set to reject and I’m sure others will follow.

    So we need an option in Exchange to change the From address to the DL instead of the sending user. With an EDGE server this can be done.


  3. Paul says:

    Mainly DMARC builds upon both the DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) specifications that are currently being developed within the IETF. DMARC is designed to replace ADSP by adding support for:
    1) wildcarding or subdomain policies,
    2) non-existent subdomains,
    3) slow rollout (e.g. percent experiments)
    4) SPF
    5) quarantine mailing lists<


  4. jasonsherry says:

    From a user as a workaround, which does work but requires a mailbox for each DL and multiple manual setup steps. I also recommend using Transport rules and/or Delivery restrictions to limit who\want can be sent to the mailbox\DL. I have setup something like this for one of my DLs, but I host over 20 and instead I’m working on getting ListSrv ( setup instread for a better solution.

    Thankfully I found one – it’s not the greatest but it works. Here’s what I did:

    Let’s say the distro list was
    Change distro list to
    Create a new user mailbox with the address
    Setup an inbox rule on the new user mailbox that says “forward all emails received by this inbox to
    Be sure to add as an authorized sender for the distro list.
    Be aware this will defeat the security of the distro list if you have it set to only allow those on the list to send to the list. This is because anyone who knows “” can now send to it without having to be on the list as “” is authorized and is blind-forwarding all messages to the distro list; however, I’d rather have this & a powerful antispam filter than have my emails bounce.

    So… why does this setup work?
    It works because the original senders email (eg. with a yahoo / comcast / aol / etc.) account is accepted by the user inbox “” – That inbox then forwards the email to the distro list “” – that forwarded email is now coming from “” moving the original senders info to the forwarded portion of the email. Therefore, when the email comes out of the distro list, it’s coming from “” – and AOL, Yahoo, Comcast all accept it because we are authorized to send email from our own email server.


  5. Pingback: DMARC Workaround for @yahoo & @aol sending to DL with external recipients | Jason (Izzy) Sherry's Blog

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s