Understanding DNS Record Types and Names for Email deliverability configuration.
DNS Records for Email Authentication (Works for GoDaddy and Other Domain Providers)
This article explains the DNS record types you’ll use to authenticate email sending and improve deliverability. While the examples reference GoDaddy-style fields, the same records apply to any DNS host (Cloudflare, Namecheap, Google Domains/Squarespace Domains, Network Solutions, Hover, etc.). The only difference is what your provider labels the fields (for example, Host/Name vs Record name).
On this Page
- What Commonsku provides
- How to set up DNS
- Common DNS records
- SPF records and what it does
- Quick checklist for DNS configuration
What commonsku provides vs what you may see in your email platform
commonsku only provides the following DNS entries for your domain updates:
-
SPF (TXT record)
-
CNAME record(s)
We do not provide a DKIM record directly.
In most setups, DKIM is handled by your email sending service via CNAME records. If the SPF TXT and the CNAME record(s) you add match what commonsku provides, then DKIM should authenticate correctly once DNS propagates.
DMARC is optional but recommended. It’s a separate TXT record you can add to control policy and reporting.
DNS fields across providers (GoDaddy vs others)
Most DNS providers ask for the same information:
-
Type: TXT, CNAME, A, etc.
-
Name / Host: what comes before your domain
-
Value / Content / Target: what the record points to (or the text value)
-
TTL: cache time (defaults are fine)
How “Name/Host” works
-
@means the root domain (example.com) -
wwwmeans www.example.com -
_dmarcmeans _dmarc.example.com -
selector._domainkeymeans selector._domainkey.example.com
CNAME records are commonly used for verification and DKIM enablement. The most frequent issue is that different DNS providers expect the Name/Host field differently—especially for DKIM-style records that include
_domainkey(sometimes written or misread as “domainKey”).The key rule
Your goal is that the final record name becomes:
selector1._domainkey.yourdomain.comBut different DNS providers want you to type different things in the Name/Host box to achieve that.
Common DNS record types
A Record
Maps a name to an IPv4 address (often for your website).
-
Type: A
-
Name/Host:
@or a subdomain likewww -
Value: an IP address
CNAME Record
Points a hostname to another hostname (common for verification and email auth).
-
Type: CNAME
-
Name/Host: a subdomain/label (e.g.,
tracking,selector1._domainkey) -
Value/Target: another hostname provided by the service
TXT Record
Stores text values (SPF, DMARC, verification tokens).
-
Type: TXT
-
Name/Host:
@or a label like_dmarc -
Value/Content: text string
SPF (TXT record)
What SPF does
SPF tells receiving mail servers which services are allowed to send email from your domain, reducing spoofing and improving deliverability.
Important SPF rules
-
You should only have one SPF record per hostname (usually one TXT at
@containing onev=spf1 ...string). -
If you use multiple senders (e.g., Microsoft 365 + another platform), you combine includes into a single SPF value.
-
SPF has a DNS lookup limit (10). Too many
include:entries can cause SPF to fail.
How to add SPF (any provider)
Create or edit a TXT record:
-
Type: TXT
-
Name/Host:
@ -
Value: provided SPF string (from commonsku)
Example format:
-
v=spf1 include:example-sender.com ~all
~all vs -all
-
~all(soft fail): safer while validating setup -
-all(hard fail): stricter, use once confident you’ve included every legitimate sender
CNAME records (commonly used for verification and DKIM enablement)
Why CNAMEs matter here
Many email systems “enable DKIM” by having you publish CNAME records that point to their DKIM keys. You may not be adding a TXT key directly; instead, the provider checks the CNAME(s) and uses them to validate DKIM.
How to add CNAMEs (any provider)
Create one or more CNAME records exactly as provided:
-
Type: CNAME
-
Name/Host: (example)
selector1._domainkey -
Value/Target: (example)
selector1.something.provider.com
commonsku will provide the CNAME record(s) needed. If those match exactly, DKIM should validate once DNS propagates.
DKIM (what you need to know)
What DKIM does
DKIM digitally signs outbound email so recipients can verify the message is authentic and unaltered.
Key point for commonsku users
-
commonsku does not provide a DKIM TXT record.
-
DKIM is typically verified/activated through the CNAME record(s) commonsku provides.
-
If the SPF TXT and CNAME record(s) are correct, DKIM should update/align correctly on its own after propagation.
DMARC (recommended)
What DMARC does
DMARC tells receiving servers what to do when SPF/DKIM fail and provides reporting so you can monitor authentication and spoofing attempts.
DMARC record basics
DMARC is a TXT record at:
-
Type: TXT
-
Name/Host:
_dmarc -
Value: policy string
Suggested DMARC rollout
Start in monitor-only mode, then tighten:
Monitoring:
-
v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com; adkim=s; aspf=s; pct=100
Stronger enforcement (later):
-
p=quarantineorp=reject
Use a dedicated mailbox for
rua=(reports can be noisy), or a DMARC reporting service.
Quick checklist (any DNS provider)
-
Add/confirm SPF (TXT at @) exactly as provided by commonsku
-
Add/confirm CNAME record(s) exactly as provided by commonsku
-
(Optional but recommended) Add DMARC (TXT at _dmarc)
-
Wait for DNS propagation (can be minutes to 24–48 hours depending on TTL/provider)
-
Re-check authentication status in your sending platform/tools
Quick Reference: What to Enter in the email domain host.
| Purpose | Type | Name/Host | Value (example) |
|---|---|---|---|
| WWW alias | CNAME | www | example.host.com |
| SPF | TXT | @ | v=spf1 include:_spf.google.com ~all |