IP Authentication Override
Overview
IP Authentication Override allows you to override SPF authentication failures caused by known, trusted sending infrastructure, particularly in environments with complex or hybrid mail routing.
In certain configurations (e.g., on-prem → cloud → on-prem), legitimate internal messages may fail SPF because the sending IP is not included in public DNS records.
This can lead to:
- incorrect authentication failures in Sublime
- misclassification of internal messages as Inbound
- unintended detections or automations
IP Authentication Override resolves this by allowing you to explicitly trust specific sending IPs without modifying SPF records.
How It Works
During message processing:
- Sublime evaluates SPF based on the sending IP and domain
- If SPF fails due to an untrusted sending IP
- Sublime checks if that IP is listed in IP Authentication Override
- If matched:
- SPF result is overwritten to pass
- Message proceeds through normal classification and detection
This enables:
- correct classification as type.Internal (instead of type.Inbound)
- avoidance of false positives caused by authentication failure
Important Behavior
IP Authentication Override:
- does not bypass detection or remediation
- does not skip rules or automations
- only modifies the SPF authentication result
All other signals (content, links, behavioral detections) remain unchanged.
Why This Exists
SPF requires publishing authorized sending IPs in DNS. However:
- SPF records are public
- some organizations consider internal IPs sensitive
- hybrid routing can introduce intermediate hops that break SPF
These factors can cause legitimate mail to fail authentication.
IP Authentication Override provides a controlled alternative without requiring DNS changes.
Supported Use Cases
Internal Mail Relay
- On-prem → cloud provider → back to on-prem
- Internal relay IP not included in SPF
- Messages incorrectly fail SPF
→ Add relay IP to IP Authentication Override
Hybrid Email Infrastructure
- Combination of on-prem + cloud mail systems
- Routing introduces SPF failures on internal traffic
→ Trust internal relay or gateway IPs
SPF Privacy Constraints
- Customer does not want to expose internal IPs in public DNS
→ Use IP Authentication Override instead of modifying SPF
Temporary Migration State
- SPF not yet updated during infrastructure changes
→ Use as a temporary mitigation
Classification Impact
Without IP Authentication Override:
- SPF fail → message treated as type.Inbound
With IP Authentication Override:
-
SPF overridden to pass
→ message can be correctly treated as type.Internal
Limitations
Per-Hop SPF Behavior
- Applies only to the evaluated sending IP
- Does not override SPF failures from earlier hops
SPF Scope
- Only affects SPF
- Does not modify:
- DKIM
- DMARC
- ARC
Risks
Shared Infrastructure (High Risk)
Do not add IPs from:
- Microsoft
- AWS
- Salesforce
These are shared environments and may introduce false negatives.
Large CIDR Ranges
Broad ranges may:
- include IPs you do not control
- weaken authentication signals
Best Practices
- Only add IPs you fully control
- Use narrow IP ranges
- Treat this as a targeted override, not a general trust mechanism
- Periodically review configured IPs
Updated 21 days ago