An example from your DMARC report:
Host 216.207.245.17 (reverse lookup tells us lists.digium.com) sends 147 emails on behalf of your email domain. These emails PASS an SPF check, but, since the domain used for the SPF check does not align with your email domain, it fails in regards to DMARC.
Especially email forwarders / mailing lists behave this way. Before distributing the email to the members of the list, the bounce address (aka smtp.mailfrom / return-path / envelope from address) is re-written, so that Non-Delivery Reports (NDRs) are sent back to the mailing list provider and not to the original sender.
While the FROM address is shown to the recipient in the email client, the envelope from address is hidden, but IS used to check the SPF on. This is why DMARC is so important to protect against phishing, because SPF (or DKIM) alone does not authenticate the FROM address the recipient sees.
The way mailing lists typically behave will fail DMARC authentication on SPF check, because the alignment between envelope from domain and FROM domain is removed. Also, sometimes DKIM signed fields such as subject are edited, which breaks the original DKIM signature.
This is exactly why ARC (Authenticated Received Chain) is being created, as an extension to DMARC. Unfortunately, ARC is still in Draft stage.
So if we look back at our example, the mailing list provider re-writes the envelope from address to something@lists.digium.com and the receiving mail server checks the domain lists.digium.com for an SPF record, which it finds: "v=spf1 a mx ip4:216.207.245.0/26 ~all\". SPF passes (216.207.245.17 is part of range 216.207.245.0/26), DMARC fails. Depending on your DMARC policy action and receiving server configuration, the email may be marked as SPAM, quarantined, rejected or delivered to the Inbox.