Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 058

ARC (Authenticated Received Chain)

What is ARC (Authenticated Received Chain)?

ARC (Authenticated Received Chain)An email standard defined in RFC 8617 that preserves authentication results across forwarding hops by letting each intermediary cryptographically sign the chain of prior checks.


Authenticated Received Chain (ARC), specified in RFC 8617, addresses a common problem with DMARC: legitimate forwarders (mailing lists, secure email gateways) often modify messages in ways that break SPF and DKIM. ARC-compliant intermediaries add three headers — ARC-Authentication-Results, ARC-Message-Signature, and ARC-Seal — that record the SPF/DKIM/DMARC verdicts they saw and sign the cumulative chain. Final receivers can trust an ARC chain from a vetted forwarder and apply local overrides instead of rejecting valid mail. Major mailbox providers including Google, Microsoft, and Yahoo implement ARC. Operators should validate ARC chains, maintain a list of trusted ARC sealers, and monitor for tampering or chain breakage.

Examples

  1. 01

    A mailing list rewrites the From: address and adds ARC headers so the destination can still trust the original DMARC pass.

  2. 02

    A secure email gateway signs an ARC seal after applying disclaimers, allowing downstream DMARC alignment.

Frequently asked questions

What is ARC (Authenticated Received Chain)?

An email standard defined in RFC 8617 that preserves authentication results across forwarding hops by letting each intermediary cryptographically sign the chain of prior checks. It belongs to the Network Security category of cybersecurity.

What does ARC (Authenticated Received Chain) mean?

An email standard defined in RFC 8617 that preserves authentication results across forwarding hops by letting each intermediary cryptographically sign the chain of prior checks.

How does ARC (Authenticated Received Chain) work?

Authenticated Received Chain (ARC), specified in RFC 8617, addresses a common problem with DMARC: legitimate forwarders (mailing lists, secure email gateways) often modify messages in ways that break SPF and DKIM. ARC-compliant intermediaries add three headers — ARC-Authentication-Results, ARC-Message-Signature, and ARC-Seal — that record the SPF/DKIM/DMARC verdicts they saw and sign the cumulative chain. Final receivers can trust an ARC chain from a vetted forwarder and apply local overrides instead of rejecting valid mail. Major mailbox providers including Google, Microsoft, and Yahoo implement ARC. Operators should validate ARC chains, maintain a list of trusted ARC sealers, and monitor for tampering or chain breakage.

How do you defend against ARC (Authenticated Received Chain)?

Defences for ARC (Authenticated Received Chain) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for ARC (Authenticated Received Chain)?

Common alternative names include: ARC, Authenticated Received Chain.

Related terms