PSD DMARC is one of those DMARC topics that sounds niche until you run into a domain space where it matters.
If you only manage a normal domain like example.com, you may never need to publish anything specifically for PSD DMARC. But if you troubleshoot mail in regulated namespaces, branded suffixes, or receiver-side filtering systems, it is worth understanding because it changes where DMARC policy can be discovered.
The short version is:
From domain and then at the Organizational DomainIn RFC 7489, DMARC depends on the concept of an Organizational Domain.
That requires a receiver to know where the registrable boundary is. For example:
mail.example.com, the Organizational Domain is normally example.comservice.example.co.uk, the Organizational Domain is normally example.co.ukThat second example is why DMARC implementations use a public suffix list. A suffix such as co.uk is not the registrant's domain. It is the registry-controlled boundary below which domains are registered.
If you want a refresher on the registrable boundary itself, What is an apex domain? is the adjacent topic.
RFC 9091 defines a Public Suffix Domain (PSD) as a place in the DNS tree where independent organizations can register names below it.
Real-world examples include suffixes such as:
comorgco.ukbankSo if example.org is the registered domain, the PSD is org. If example.co.uk is the registered domain, the PSD is co.uk.
The important distinction is that a PSD is usually the registry boundary, not the organization you are trying to authenticate.
Normal DMARC is built for domain owners to publish policy for their own domain and, optionally, its subdomains.
That works well for:
example.comnews.example.combilling.example.comBut it leaves a gap for abuse involving names below a public suffix that are not valid or do not publish their own DMARC record.
RFC 7489 explicitly says DMARC does not solve cousin-domain abuse in general. That is why Domain lookalike/homograph defense for email exists as a separate problem space.
PSD DMARC narrows one part of that gap for participating suffixes.
In RFC 9091, receivers that support PSD DMARC can do one additional policy-discovery step.
Very roughly, the lookup order becomes:
From domain for a DMARC recordThat means a receiver may consult a DMARC record published at a public suffix such as _dmarc.bank or another participating PSD boundary.
The key limitation is just as important as the feature:
So if example.bank already has its own DMARC record, that policy is still the one that matters for mail from example.bank.
This is the part most admins care about.
PSD DMARC is not something receivers should blindly apply to every public suffix on the Internet. RFC 9091 describes it as an experimental extension, and it expects receivers to know which PSDs are valid PSD DMARC participants.
Operationally, PSD DMARC matters in cases like these:
RFC 9091 uses examples such as a regulated namespace like .bank.
If an attacker spoofs mail from a non-existent domain under that suffix, PSD DMARC can let the suffix operator publish a policy that helps receivers treat that mail as suspicious or rejectable, even though the fake domain never published its own DMARC record.
That is useful because defensive registration of every typo and cousin domain is not scalable.
RFC 9091 also calls out branded PSDs such as .google.
Those suffixes may appear on the public suffix list for technical reasons, but operationally they are closer to one organization controlling the full tree. PSD DMARC gives them a way to benefit from DMARC at that boundary too.
This is the practical fallback case.
If the receiver cannot apply a host or Organizational Domain DMARC policy, PSD DMARC gives it one more place to look, but only when that PSD is known to participate.
np tag is forRFC 9091 adds a DMARC tag named np.
It stands for the requested receiver policy for non-existent subdomains. Its values are the same as p and sp:
nonequarantinerejectWhy this matters:
If np is not present, the receiver falls back to sp or p as defined in RFC 9091.
Imagine a namespace where registrations happen under bank.
There is a real institution:
example.bankBut an attacker sends mail with:
From: support@examp1e.bankAssume examp1e.bank is not actually registered.
Without PSD DMARC, a receiver may find no DMARC policy at the fake domain and no usable Organizational Domain policy beyond it.
With PSD DMARC support, if bank is a participating PSD, the receiver can also query _dmarc.bank and apply the PSD operator's published handling and reporting rules.
That does not make cousin-domain abuse disappear everywhere. It does mean a participating suffix can extend some DMARC protection to a part of the namespace that plain DMARC could not cover well.
This is where confusion starts, so it is worth being explicit.
PSD DMARC does not mean:
It also does not replace normal sender hygiene. You still need aligned SPF and DKIM for your real domains. If that part needs a refresher, see DMARC identifier alignment deep dive.
RFC 9091 spends meaningful time on privacy because PSD-level reporting can leak information upward to the public suffix operator.
That is why the document is careful about where PSD DMARC reporting is appropriate, especially for multi-organization suffixes.
Two practical takeaways:
In particular, RFC 9091 says PSD DMARC feedback must be limited to aggregate reports, not failure-report style leakage.
If you run a normal business domain under a common suffix such as .com, the immediate effect may be small today.
But PSD DMARC still matters if any of these are true:
The biggest mistake is assuming PSD DMARC is "just another tag" in your own domain's record. It is really about who is allowed to publish fallback policy at the registration boundary.
If you operate a receiver, secure email gateway, or authentication-analysis tool, PSD DMARC is more operationally relevant.
You need to know:
np tagThis is another reason stale public suffix data is dangerous. The Public Suffix List itself warns that static copies age badly. If the suffix boundary logic is outdated, Organizational Domain discovery can be wrong even before PSD DMARC enters the picture.
Use this model and PSD DMARC gets much easier to reason about:
For most domain owners:
For receiver or tooling admins:
Public Suffix Domain DMARC is an extension to DMARC policy discovery, not a replacement for normal DMARC.
It matters when a participating public suffix wants to publish fallback DMARC policy at the registry boundary, especially to help with abuse involving non-existent domains under that suffix. Most domain owners still need to focus first on ordinary SPF, DKIM, and DMARC deployment on their own domains, but admins who work in special namespaces or on receiver-side tooling should absolutely know when PSD DMARC is in play.