Close Menu
SmartMails Blog – Email Marketing Automation | SmartMailsSmartMails Blog – Email Marketing Automation | SmartMails
    What's Hot

    Crafting Effective Email Campaigns for Instant Conversions

    April 29, 2026

    Demystifying Email Client HTML Rendering

    April 29, 2026

    Building Customer Loyalty Through Email Campaigns

    April 29, 2026

    AI Spam Filter Behavior: Impact on Marketers

    April 29, 2026

    SmartMails’ Automated Retry Logic for Failed Emails

    April 29, 2026

    Revive Your Customer Base: Email Marketing Strategies for Reactivation

    April 28, 2026
    Facebook X (Twitter) LinkedIn WhatsApp
    • Smartmails
    • Pricing
    • Features
    • About us
      • Helping Hands
      • What We Do
      • FAQs
    • Contact us
    Facebook X (Twitter) LinkedIn WhatsApp
    SmartMails Blog – Email Marketing Automation | SmartMailsSmartMails Blog – Email Marketing Automation | SmartMails
    • Home
    • Recources
      1. Features
      2. Business
      3. Technology
      4. Email Marketing
      5. View All

      SmartMails’ Automated Retry Logic for Failed Emails

      April 29, 2026

      Maximizing A/B Testing with SmartMails Campaign Versioning

      April 28, 2026

      Maximizing Email Delivery with ISP-Friendly Queue Throttling

      April 27, 2026

      Maximizing Email Personalization with SmartMail Dynamic Content Blocks

      April 26, 2026

      Demystifying Email Client HTML Rendering

      April 29, 2026

      Building Customer Loyalty Through Email Campaigns

      April 29, 2026

      Understanding Email Authentication Failures and Fixes

      April 28, 2026

      Maximizing Email Marketing ROI: Tracking Methods for Business Owners

      April 28, 2026

      AI Spam Filter Behavior: Impact on Marketers

      April 29, 2026

      Demystifying Kubernetes-based Email Sending Infrastructure

      April 28, 2026

      The Role of Reverse DNS in Email Authentication Systems

      April 27, 2026

      Optimizing Deliverability: Advanced Email Routing Algorithms

      April 26, 2026

      Crafting Effective Email Campaigns for Instant Conversions

      April 29, 2026

      Revive Your Customer Base: Email Marketing Strategies for Reactivation

      April 28, 2026

      Boost Sales with High Performing Email Campaigns for Product Promotions

      April 27, 2026

      Maximizing Conversions: Email Marketing Strategies for Retargeting Website Visitors

      April 26, 2026

      Crafting Effective Email Campaigns for Instant Conversions

      April 29, 2026

      Demystifying Email Client HTML Rendering

      April 29, 2026

      Building Customer Loyalty Through Email Campaigns

      April 29, 2026

      AI Spam Filter Behavior: Impact on Marketers

      April 29, 2026
    • Get In Touch
    GET STARTED
    SmartMails Blog – Email Marketing Automation | SmartMailsSmartMails Blog – Email Marketing Automation | SmartMails
    Home » Understanding Email Authentication Failures and Fixes
    Educational

    Understanding Email Authentication Failures and Fixes

    By smartmailsApril 28, 2026No Comments18 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Photo Email Authentication Failures
    Share
    Facebook Twitter LinkedIn Pinterest Email

    You’ve just sent an important email. Maybe it’s a marketing campaign, a critical business update, or a personal communication. You hit “send” and assume it’s reached its destination. But what if it hasn’t? What if it’s landed in a spam folder, or worse, been rejected outright? This is where understanding email authentication failures becomes crucial for you.

    Email authentication isn’t just a technical detail; it’s the bedrock of your email deliverability and reputation. In a world riddled with phishing, spoofing, and spam, email providers rigorously scrutinize every incoming message to ensure its legitimacy. If your emails fail these authentication checks, you’re not just risking lost communication; you’re risking your brand’s integrity and your business’s bottom line. You might assume that simply having an email address is enough, but in today’s digital landscape, that’s far from the truth. Without proper authentication, your emails are like a letter with no return address, easily discarded and often mistrusted. You need to understand that the internet is a hostile environment for unauthenticated communications, and your emails are no exception.

    The Foundation of Trust: Why Authentication Matters to You

    Imagine you’re receiving a check in the mail. If it looks legitimate, has a known sender, and all the details align, you’re likely to trust it. If it’s a crumpled piece of paper with scribbled handwriting and a suspicious return address, you’d be wary, wouldn’t you? Email authentication works much the same way for you. It provides a standardized way for receiving mail servers to verify that an incoming email is genuinely from the domain it claims to be from, and that it hasn’t been tampered with in transit.

    For you, this translates directly to spam folder avoidance. Email service providers (ESPs) like Gmail, Outlook, and Yahoo have sophisticated algorithms that analyze countless factors to determine if an email is legitimate or spam. A consistent failure in authentication is a giant red flag that immediately diminishes your sender reputation. When your reputation sinks, so does your deliverability. You’ll find yourself wondering why your carefully crafted messages aren’t reaching their intended audience.

    Furthermore, email authentication protects your brand from impersonation. Without it, anyone could send emails claiming to be from your domain, potentially defrauding your customers or tarnishing your image. You can’t afford to have your customers receive phishing emails that appear to originate from you. This kind of attack erodes trust and can have long-lasting, damaging effects. Understanding and implementing these authentication protocols is not just a technical chore; it’s a strategic imperative for your digital communications.

    Before you can fix failures, you need to understand what you’re dealing with. There are three primary email authentication protocols that you need to be familiar with. Each plays a distinct role in verifying the legitimacy of your emails.

    Sender Policy Framework (SPF)

    SPF is like a guest list for your domain. You, as the domain owner, publish a record in your Domain Name System (DNS) that explicitly lists which IP addresses are authorized to send email on behalf of your domain. When a recipient server receives an email from your domain, it performs an SPF check by looking up this record. If the sending IP address isn’t on your authorized list, the SPF check fails.

    From your perspective, an SPF record is critical because it tells the world, “Only these servers are allowed to send email for my domain.” If an unauthorized server tries to send mail purporting to be from you, it will be flagged. This significantly reduces the chances of spammers or phishers successfully spoofing your domain. You need to ensure this list is accurate and up-to-date, or you risk legitimate emails failing authentication.

    DomainKeys Identified Mail (DKIM)

    DKIM uses cryptographic signatures to ensure that an email hasn’t been tampered with during transit and that it genuinely originates from your domain. When you send an email, your mail server adds a unique digital signature to the email header. This signature is generated using a private key that only your server possesses. The corresponding public key is published in your domain’s DNS records.

    When a recipient server receives the email, it retrieves your public key from your DNS and uses it to decrypt the signature. If the signature matches the email content and headers, the DKIM check passes. If there’s a mismatch, it indicates that the email was either forged or altered after it was sent. For you, DKIM offers a stronger guarantee of message integrity than SPF alone. It’s like a tamper-evident seal on your mail. Even if an email claims to be from you, DKIM verifies that it hasn’t been changed along the way.

    DMARC (Domain-based Message Authentication, Reporting, and Conformance)

    DMARC builds upon SPF and DKIM, providing you with a policy framework that tells recipient servers what to do with emails that fail SPF or DKIM checks. It also provides a reporting mechanism, allowing you to receive valuable feedback on how your emails are being authenticated.

    When you implement DMARC, you publish a record in your DNS that specifies a policy:

    • p=none (Monitoring): You’re asking receiving servers to report on authentication failures without taking any action. This is an excellent starting point for you to gather data and understand your email landscape.
    • p=quarantine (Quarantine): You’re suggesting that receiving servers move emails that fail DMARC to the spam or junk folder. This is a more assertive step for you, as it starts to filter out illegitimate emails.
    • p=reject (Reject): You’re instructing receiving servers to completely reject emails that fail DMARC. This is the strongest policy and should only be set once you are confident that all your legitimate emails will pass authentication.

    DMARC also allows you to specify a reporting address where you’ll receive aggregate and forensic reports. These reports are invaluable for you, providing insights into common authentication failures, sources of spoofing, and legitimate sending services that might not be correctly authenticated. You need to leverage these reports to fine-tune your authentication settings and ensure maximum deliverability.

    For those looking to deepen their understanding of email authentication failures and the necessary fixes, it’s beneficial to explore related topics that can impact email deliverability. One such article discusses the process of migrating from Mailchimp to SmartMails while ensuring data integrity, which can be crucial for maintaining effective email campaigns. You can read more about this in the article titled “Migrating from Mailchimp to SmartMails: Keep Your Data Intact” available at this link.

    Common Causes of Authentication Failures

    You’ll quickly discover that authentication failures aren’t always straightforward. A variety of issues can lead to your legitimate emails getting flagged or rejected. Understanding these common pitfalls will help you proactively address them.

    Incorrect DNS Records

    This is perhaps the most frequent culprit. You might have an SPF record that’s missing an authorized IP address, a DKIM record with a typo, or a DMARC record that’s improperly configured.

    Missing or Malformed SPF Records

    If your SPF record doesn’t include the IP addresses of all your legitimate sending services (e.g., your email service provider, transactional email service, marketing automation platform), any emails sent from those services will fail SPF. Moreover, if your SPF record has syntax errors, it will be ignored by receiving servers, leading to a de facto SPF failure. You need to be incredibly precise when creating and updating these records.

    Expired or Invalid DKIM Keys

    DKIM keys have a lifetime. If your private key expires or if there’s a mismatch between the private key your server uses and the public key in your DNS, DKIM authentication will fail. Sometimes, when you migrate email services, you might forget to update your DKIM records with the new keys. You need to regularly review your DKIM setup, especially after any changes to your email infrastructure.

    DMARC Misconfigurations

    You might have a DMARC policy that’s too aggressive (e.g., p=reject) before all your legitimate sending sources are properly authenticated. This can inadvertently cause your own emails to be rejected. Additionally, a missing or incorrect rua (aggregate report URI) or ruf (forensic report URI) tag means you won’t receive the crucial reports needed to monitor and troubleshoot your authentication. You need to start with p=none and carefully analyze the reports before moving to more restrictive policies.

    Misaligned “From” Addresses

    DMARC requires “alignment” between the domain in the “From” header (the one your recipients see) and the domain used for SPF and DKIM.

    SPF Alignment Failures

    For SPF to align, the domain in the “Return-Path” header (also known as the “Mail From” or “Envelope From” address) must match the domain in the “From” header. Often, when you use a third-party email service provider (ESP), their sending infrastructure might use their own domain in the Return-Path, leading to an SPF alignment failure, even if SPF itself passes. You need to understand how your ESP handles the Return-Path and whether they offer options to ensure alignment.

    DKIM Alignment Failures

    For DKIM to align, the domain in the “d=” tag of the DKIM signature must match the domain in the “From” header. Similar to SPF, some ESPs might use their own domain in the DKIM signature, which can cause alignment issues. You must verify that your ESP is signing emails with your domain.

    Email Forwarding Issues

    When an email is forwarded, the original SPF check can break. This is because the new forwarding server’s IP address might not be included in your SPF record, causing the forwarded email to fail SPF. While DKIM often survives forwarding, SPF failures can still lead to DMARC issues. You need to be aware that once an email leaves your direct control and is forwarded, its authentication status can be compromised.

    Using Third-Party Sending Services (and Not Authenticating Them)

    Many businesses, including yours, use various third-party services for sending email:

    • Marketing automation platforms (Mailchimp, HubSpot, SendGrid)
    • Transactional email services (Postmark, SparkPost)
    • Customer support platforms (Zendesk, Salesforce)
    • VoIP services sending voicemails via email

    Each of these services needs to be explicitly authorized in your SPF record, and you need to configure DKIM for them to sign emails with your domain. If you forget to add these services, or if you don’t configure them correctly, their emails will fail authentication, even though they are legitimate. You need to meticulously review every service that sends email on your behalf and ensure their proper authentication. This is a common oversight that leads to significant deliverability problems.

    Diagnosing Email Authentication Failures

    Email Authentication Failures

    You’re experiencing deliverability issues, and you suspect authentication problems. How do you confirm your suspicions and pinpoint the exact cause? Diagnostics are key.

    Utilizing Online Authentication Checkers

    Numerous free online tools can help you check your SPF, DKIM, and DMARC records. Websites like MXToolbox, DMARC Analyzer, and mail-tester.com allow you to:

    • Input your domain: These tools will fetch your DNS records and report on their syntax and validity. They’ll tell you if you have multiple SPF records (a common no-no), syntax errors, or missing DKIM entries.
    • Send a test email: Some tools provide a unique email address to which you can send a test message. They’ll then analyze the email headers for proper SPF, DKIM, and DMARC passes or failures, including alignment issues.

    You should make these tools a regular part of your email configuration audit. They provide instant feedback and often highlight errors you might otherwise overlook.

    Analyzing Email Headers

    Every email carries a wealth of information in its headers. You can typically view these headers in your email client (e.g., “Show Original” in Gmail, “View Message Source” in Outlook). Look for lines related to SPF, DKIM, and DMARC.

    SPF Results

    You’ll see lines like:

    • Received-SPF: pass
    • Received-SPF: softfail
    • Received-SPF: fail
    • Received-SPF: neutral
    • Received-SPF: permerror

    These tell you the SPF verdict and can often indicate the specific IP address that caused a “fail” or “softfail.”

    DKIM Results

    Look for lines indicating the DKIM status:

    • DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=yourdomain.com; s=selector;...
    • Authentication-Results: ...; dkim=pass (signature was verified) header.d=yourdomain.com;

    You’re looking for dkim=pass and ensuring the header.d value matches your sending domain.

    DMARC Results

    DMARC combines the results of SPF and DKIM. You’ll typically see:

    • Authentication-Results: ...; dmarc=pass (p=quarantine dis=none) header.from=yourdomain.com
    • Authentication-Results: ...; dmarc=fail (p=reject dis=none) header.from=yourdomain.com

    The DMARC result indicates whether your policy was applied and the disposition (e.g., dis=none for action p=none). It also explicitly checks for alignment.

    Reviewing DMARC Reports

    Once you have a DMARC record with rua and/or ruf tags, you’ll start receiving DMARC reports. These are XML files, which can be daunting to read directly. You should use a DMARC reporting service (many of which have free tiers) to parse and visualize this data. These services can show you:

    • Authentication statistics: What percentage of your emails passed SPF, DKIM, and DMARC over time.
    • Sending sources: All the IP addresses and domains sending emails claiming to be from your domain, both legitimate and illegitimate. This is crucial for identifying unknown senders or misconfigured services.
    • Failure reasons: Specific reasons for SPF and DKIM failures.
    • Policy application: Which emails were rejected, quarantined, or allowed based on your DMARC policy.

    You need to regularly monitor these reports. They are your primary source of truth for understanding your domain’s email ecosystem and spotting potential issues or malicious activity.

    Fixing Authentication Failures

    Photo Email Authentication Failures

    Once you’ve diagnosed the problem, you can take concrete steps to fix it. This is where your understanding translates into action.

    Correcting SPF Records

    Adding Missing IP Addresses or Includes

    If your DMARC reports or header analysis reveal SPF failures from legitimate sending services, you need to update your SPF record. For each service, they will typically provide an include statement (e.g., include:_spf.google.com) or specific IP addresses to add. Remember:

    • You can only have one SPF record per domain. Multiple SPF records will invalidate all of them.
    • The lookup limit: SPF has a 10-lookup limit. If your SPF record contains too many include statements or mechanisms that require DNS lookups, it can cause a permerror. You might need to flatten your SPF record or use a service that helps manage complex SPF records.

    You need to be meticulous when modifying your SPF record. Even a small typing error can lead to widespread deliverability issues.

    Ensuring Correct Syntax and Mechanisms

    Double-check your SPF record against online validators. Ensure you have a mechanism for allowing (+a, +mx, +ip4, +ip6, +include) and a mechanism for denying or instructing (-all for hard fail, ~all for soft fail). For most production environments, you’ll want ~all or -all at the end of your SPF record to indicate what receiving servers should do with unauthorized senders. You need to understand the implications of -all versus ~all before you apply them.

    Fixing DKIM Issues

    Generating and Publishing New Keys

    If your DKIM key is expired, compromised, or you’re setting up a new sending service, you’ll need to generate a new pair of public and private keys. Your email service provider or the third-party sending service will typically guide you through this process and provide the public key to publish in your DNS.

    Verifying DNS Entry and Selectors

    Ensure the DKIM record you publish in your DNS matches the one provided by your sending service exactly. Pay close attention to the selector (the s= tag in the DKIM header and the prefix in your DNS record, e.g., s=default means the DNS record is default._domainkey.yourdomain.com). A mismatch will cause DKIM to fail. You need to verify that your DNS registrar has propagated the changes correctly.

    Checking for Domain Alignment

    Work with your ESP or third-party service to ensure they are signing emails with your domain (d=yourdomain.com). Many services allow you to configure a “custom signing domain” or “white-labeling” option that ensures DKIM alignment. This is critical for DMARC to pass. You may need to upgrade to a higher tier of service to unlock this feature with some providers.

    Refining Your DMARC Policy

    Starting with p=none for Monitoring

    If you haven’t implemented DMARC, or if you’re experiencing widespread failures, always start with p=none. This allows you to gather data from the DMARC reports without impacting your deliverability. You need to understand your current email sending landscape before enforcing any policy.

    Gradually Moving to p=quarantine and p=reject

    Once your DMARC reports consistently show that almost all your legitimate emails are passing SPF and DKIM with alignment, you can slowly move to p=quarantine. Monitor the reports closely. If you see very few legitimate failures, you can eventually move to p=reject for maximum protection against spoofing. This transition should be data-driven and gradual. You should not rush this process.

    Configuring DMARC Reporting

    Ensure your DMARC record includes rua (aggregate reports) and preferably ruf (forensic reports) addresses. Use a DMARC reporting service to easily digest and act on this data. These reports are your eyes and ears for email authentication. You need to specify an email address that can receive these reports, and ideally, that address should point to a DMARC monitoring service.

    Understanding email authentication failures and their fixes is crucial for maintaining a healthy email deliverability rate. For those looking to enhance their email strategies, a related article offers valuable insights into optimizing email campaigns through data-driven techniques. You can explore this further in the article on email split testing, which provides practical tips to improve engagement and conversion rates.

    Proactive Measures and Best Practices

    Authentication Method Failure Cause Potential Fixes
    SPF (Sender Policy Framework) Incorrect SPF record Update SPF record to include all authorized sending servers
    DKIM (DomainKeys Identified Mail) Missing or misconfigured DKIM key Generate and deploy DKIM key for the domain
    DMARC (Domain-based Message Authentication, Reporting, and Conformance) DMARC policy misconfiguration Review and adjust DMARC policy to align with SPF and DKIM

    You now understand the protocols, diagnoses, and fixes. But maintaining robust email authentication is an ongoing process. You need to adopt proactive measures to ensure long-term success.

    Regular Audits of DNS Records

    Your email ecosystem is dynamic. New services are adopted, old ones are retired, and IP addresses can change. You should schedule regular (e.g., quarterly) reviews of your SPF, DKIM, and DMARC records to ensure they are accurate and up-to-date. You can integrate this into your IT maintenance schedule.

    Monitoring Third-Party Sender Configuration

    Any service that sends email on your behalf must be properly authenticated. Maintain an inventory of all such services and ensure their SPF includes are present in your record, and their DKIM is correctly configured to sign with your domain. You need to communicate with your vendors to ensure they understand your authentication requirements.

    Leveraging DMARC Reports Continuously

    DMARC reports are not a one-and-done solution. They provide ongoing insights into your email traffic. You should dedicate time to reviewing these reports regularly to identify new sending sources, detect spoofing attempts, and catch any authentication regressions. This continuous monitoring is your best defense against emerging threats and misconfigurations.

    Educating Your Team

    Ensure anyone in your organization responsible for sending emails or managing IT infrastructure understands the importance of email authentication. Knowledge prevents accidental misconfigurations or the introduction of new, unauthenticated sending services. You might consider creating internal guidelines or a help sheet for new employees.

    Staying Updated on Evolving Standards

    Email authentication standards continue to evolve. Keep an eye on industry news and updates from organizations like M3AAWG. New protocols or best practices might emerge that you need to adopt to maintain optimal deliverability and security. You don’t want to be caught off guard by changes in the email landscape.

    In conclusion, understanding email authentication failures and implementing their fixes is not merely a technical task; it’s a fundamental aspect of your digital communication strategy, vital for your brand’s reputation and your deliverability. By diligently applying SPF, DKIM, and DMARC, regularly diagnosing issues, and adopting proactive best practices, you can ensure your emails consistently reach their intended recipients, fostering trust and protecting your brand in the complex world of email. You have the power to control your email destiny, and it starts with robust authentication.

    FAQs

    What is email authentication?

    Email authentication is the process of verifying that an email message is actually sent from the domain it claims to be from. It helps prevent email spoofing and phishing attacks.

    What are common causes of email authentication failures?

    Common causes of email authentication failures include incorrect DNS records, misconfigured email servers, and unauthorized use of a domain’s email address.

    How can SPF, DKIM, and DMARC help prevent email authentication failures?

    SPF (Sender Policy Framework), DKIM (DomainKeys Identified Mail), and DMARC (Domain-based Message Authentication, Reporting, and Conformance) are email authentication protocols that help prevent email spoofing and phishing attacks by verifying the authenticity of the sender’s domain.

    What are some common fixes for email authentication failures?

    Common fixes for email authentication failures include updating DNS records, configuring email servers correctly, implementing SPF, DKIM, and DMARC protocols, and monitoring email authentication reports for any issues.

    Why is it important to address email authentication failures?

    Addressing email authentication failures is important because it helps protect the integrity of an organization’s email communications, prevents email spoofing and phishing attacks, and ensures that legitimate emails are delivered successfully.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMaximizing Email Marketing ROI: Tracking Methods for Business Owners
    Next Article Revive Your Customer Base: Email Marketing Strategies for Reactivation
    smartmails
    • Website

    As the Author of Smartmails, i have a passion for empowering entrepreneurs and marketing professionals with powerful, intuitive tools. After spending 12 years in the B2B and B2C industry, i founded Smartmails to bridge the gap between sophisticated email marketing and user-friendly design.

    Related Posts

    Educational

    Demystifying Email Client HTML Rendering

    April 29, 2026
    Educational

    The Ultimate Beginner’s Guide to Email Campaign Segmentation Strategies

    April 27, 2026
    Educational

    Troubleshooting Email Deliverability: Identifying and Fixing Issues

    April 26, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Latest Reviews

    Unlocking the Power of Exclusivity: Dedicated IP for High-Volume Senders

    November 10, 2025132 Views

    Email Marketing vs. Transactional Emails: Understanding the Key Differences

    November 7, 202591 Views

    Unlocking Success: A/B Testing for Data-Driven Decisions

    November 10, 202571 Views

    10 Email Marketing Strategies for Sure Success on 2023

    November 7, 202552 Views

    10 Email Marketing Best Practices for Fashion Brands

    November 7, 202537 Views
    Stay In Touch
    • Facebook
    • WhatsApp
    • Twitter
    • LinkedIn
    Educational
    Technology

    Unlocking the Power of Exclusivity: Dedicated IP for High-Volume Senders

    smartmailsNovember 10, 202511 Mins Read
    Features

    Unlocking Success: A/B Testing for Data-Driven Decisions

    smartmailsNovember 10, 202512 Mins Read
    Email Marketing

    Maximizing Email Deliverability in Gmail and Outlook

    smartmailsFebruary 22, 202612 Mins Read
    Technology

    Configuring Reverse DNS and PTR Records for Delivery Success

    smartmailsJanuary 24, 202615 Mins Read
    Educational

    Demystifying Email Client HTML Rendering

    April 29, 2026

    Building Customer Loyalty Through Email Campaigns

    April 29, 2026

    Understanding Email Authentication Failures and Fixes

    April 28, 2026
    Our Picks

    Crafting Effective Email Campaigns for Instant Conversions

    April 29, 2026

    AI Spam Filter Behavior: Impact on Marketers

    April 29, 2026

    Revive Your Customer Base: Email Marketing Strategies for Reactivation

    April 28, 2026
    What's New

    SmartMails’ Automated Retry Logic for Failed Emails

    April 29, 2026

    Maximizing A/B Testing with SmartMails Campaign Versioning

    April 28, 2026

    Maximizing Email Delivery with ISP-Friendly Queue Throttling

    April 27, 2026
    Facebook X (Twitter) LinkedIn WhatsApp
    • Home
    • Technology
    • Features
    • Business
    © 2026 All rights reserved. Developed by Hostings House.

    Type above and press Enter to search. Press Esc to cancel.