Email Authentication Hub/DKIM

Master DKIM signatures for trusted email delivery

DKIM is the integrity layer of email authentication. It lets receiving servers verify that a message really came from an authorized sender and was not modified after it was signed. When DKIM is healthy, it strengthens trust, supports DMARC enforcement, and makes legitimate mail more resilient across forwarding and multi-provider setups.

This hub brings together the core educational pages, the most common DKIM troubleshooting paths, and the protocol context you need before tightening DMARC policy. Use it if you are trying to understand selectors, fix missing keys, investigate alignment failures, or verify that your providers are signing the right traffic in the right way.

Run SPF, DKIM & DMARC checkNo login. Live DNS only. Built for fast triage.

Start here

Foundational DKIM pages

For founders: what “DKIM is broken” usually means

DKIM problems often hide behind vague delivery warnings. A domain can look legitimate on the surface, yet signatures fail because a selector is missing, the wrong platform is signing, or a downstream gateway changes the message after it leaves your system.

The practical fix is to inventory every service that sends mail as your brand, confirm which one actually signs each message, and make sure the published selector record matches the signer that appears in the live headers. DKIM is rarely broken because of one dramatic mistake. It is usually broken because ownership drifted across tools over time.

For IT admins: selectors, alignment and signature failures

Major receivers expect DKIM to be both technically valid and operationally consistent. The selector must resolve, the public key must be complete, the key length should be modern, and the signing domain should align with the visible From: domain when DMARC is enabled.

The common traps are straightforward but painful: a missing selector during key rotation, a truncated TXT record, a weak legacy key, or a message body changed by a secure gateway after signing. In each case, the message may still be legitimate, but the authentication story no longer holds together.

How DKIM verification works in practice

When a message is sent, the sender adds a DKIM-Signature header. That header includes a selector (s=), a signing domain (d=), a body hash (bh=), and the cryptographic signature itself. The receiving server uses the selector and signing domain to retrieve the public key from DNS under selector._domainkey.example.com.

If the public key is present and valid, the receiver verifies the signature against the signed headers and message body. If the message body changed after signing, the body hash fails. If the selector is missing, the key is malformed, or the signature references the wrong domain, DKIM fails even when the sender is otherwise legitimate. For the full flow, read the Complete DKIM Guide.

DKIM troubleshooting playbook

Deep dives for specific DKIM errors

When DKIM alone is not enough

DKIM is only one part of the full authentication stack. It helps prove message integrity and domain ownership, but it does not authorize sending infrastructure by itself and it does not tell receivers how to enforce failures against your visible brand.

SPF validates the sending path. DKIM validates the message. DMARC evaluates whether either authentication path aligns with the visible From: domain and then applies your published policy. That is why a technically valid signature is still not enough if the signing domain does not align, or if your SPF and DKIM implementation across providers is inconsistent.

For stable deployment, clean SPF first, make sure every real sender signs correctly with DKIM, and only then tighten DMARC once alignment is proven across the traffic that actually matters.

Next protocol hubs
Continue the journey with focused guides for the other protocols.