DKIM Signature

What Is DKIM? Everything You Need to Know About Digital Signatures


This post was updated on June 14, 2018. It was originally published in March 2017.

DomainKeys Identified Mail (DKIM) allows senders to associate a domain name with an email message, thus vouching for its authenticity.

A sender creates the DKIM by “signing” the email with a digital signature. This “signature” is located in the message’s header. The sending mail transfer agent (MTA) generates the signature by using an algorithm applied to the content of the signed fields. This algorithm creates a unique string of characters, or a “hash value.”

When the MTA generates the signature, the public key used to generate it is stored at the listed domain. After receiving the email, the recipient MTA can verify the DKIM signature by recovering the signer’s public key through DNS. The recipient MTA then uses that key to decrypt the hash value in the email’s header and simultaneously recalculate the hash value for the mail message it received. If these two keys match, then the email has not been altered, giving  users some security knowing that the email did originate from the listed domain, and that nothing has modified it since it was sent.

If you want to test your DKIM, Email on Acid’s spam testing tool includes a DKIM check. If you sign up for our free, seven-day trial you can try our platform today and check it out.

Try our tool for free

Does DKIM Filter Email?

No, it doesn’t. However, the information it provides does help filters that the receiving domain sets up. For instance, if the email is from a trusted domain and can be successfully verified through DKIM, the email may have its spam score reduced. If the email’s DKIM signature cannot be verified (because the email was faked or for another reason), the email might be marked as spam and either be quarantined or have a spam tag added to the subject line (to warn recipients that the email is suspect).

Gmail, for instance, does not deliver emails from eBay.com or Paypal.com if the DKIM signature cannot be successfully verified because of the likelihood that the email is a phishing attack.

How Can I Test My DKIM?DomainKeys Identified Mail (DKIM) allows senders to associate a domain name with an email message

Email on Acid offers DKIM testing as part of our spam testing suite.

You can also test DKIM by sending an email to a Gmail account. Open the email in the Gmail web app, click on the down arrow next to the “reply” button (top right of email), and select “show original.” In the original, if you see “signed-by: your domain name” then your DKIM signature is good.

What Result do I Want from DKIM?

For the most part, DKIM is binary; either it’s working and your signature can be verified (see “pass” below) or there is a problem. If your signature is working, there’s no need to read any further. If you’re experiencing errors, we have a few tips that may help you diagnose the problem.

DKIM Pass Screenshot

How Can I Read the DKIM Header?

Here is an example DKIM signature (recorded as an RFC2822 header field) for the signed message:

DKIM-Signature a=rsa-sha1; q=dns;
d=example.com;
i=user@eng.example.com;
s=jun2005.eng; c=relaxed/simple;
t=1117574938; x=1118006938;
h=from:to:subject:date;
b=dzdVyOfAKCdLXdJOc9G2q8LoXSlEniSb
av+yuU4zGeeruD00lszZVoG4ZHRNiYzR

Let’s take this piece by piece to see what it means. Each “tag” is associated with a value.

  • b = the actual digital signature of the contents (headers and body) of the mail message
  • bh = the body hash
  • d = the signing domain
  • s = the selector
  • v = the version
  • a = the signing algorithm
  • c = the canonicalization algorithm(s) for header and body
  • q = the default query method
  • l = the length of the canonicalized part of the body that has been signed
  • t = the signature timestamp
  • x = the expire time
  • h = the list of signed header fields, repeated for fields that occur multiple times

We can see from this email that:

  • The digital signature is dzdVyOfAKCdLXdJOc9G2q8LoXSlEniSbav+yuU4zGeeruD00lszZVoG4ZHRNiYzR.
    This signature is matched with the one stored at the sender’s domain.
  • The body hash is not listed.
  • The signing domain is example.com.
    This is the domain that sent (and signed) the message.
  • The selector is jun2005.eng.
  • The version is not listed.
  • The signing algorithm is rsa-sha1.
    This is the algorith used to generate the signature.
  • The canonicalization algorithm(s) for header and body are relaxed/simple.
  • The default query method is DNS.
    This is the method used to look up the key on the signing domain.
  • The length of the canonicalized part of the body that has been signed is not listed.
    The signing domain can generate a key based on the entire body or only some portion of it. That portion would be listed here.
  • The signature timestamp is 1117574938.
    This is when it was signed.
  • The expire time is 1118006938.
    Because an already signed email can be reused to “fake” the signature, signatures are set to expire.
  • The list of signed header fields includes from:to:subject:date.
    This is the list of fields that have been “signed” to verify that they have not been modified.

What Do the Results of My Email on Acid DKIM Test Mean?

The possible results for your DKIM test are:

  • pass = ‘The message was signed, the signature or signatures were acceptable, and the signature(s) passed verification tests.’
    This is the result you want to see. Everything worked perfectly.
  • fail = ‘The message was signed and the signature or signatures were acceptable, but they failed the verification test(s).’
    This means that the message had a signature, and the signature was formed correctly, but didn’t match the signature of the sending domain. This probably means the message was modified somewhere along the way.
  • none = ‘The message was not signed’
    This means that the message had no DKIM signature. This is not the same as failing.
  • policy = ‘The message was signed but the signature or signatures were not acceptable.’
    DKIM can be configured to be more or less stringent in what is an acceptable match. A “policy” error means that the message was signed and correctly formed, but didn’t meet the policy requirements of the recipient.
  • neutral = ‘The message was signed but the signature or signatures contained syntax errors or were not otherwise able to be processed.’
    The message was signed, but it was not formed correctly. This is possibly a configuration error on the sending domain side.
  • temperror = ‘The message could not be verified due to some error that is likely transient in nature, such as a temporary inability to retrieve a public key. A later attempt may produce a final result.’
    This error indicates that there was a short-term problem verifying the signature. Feel free to try again. Repeated problems with this may indicate a DNS or lookup failure on the sending domain.
  • permerror = ‘The message could not be verified due to some error that is unrecoverable, such as a required header field being absent. A later attempt is unlikely to produce a final result.’
    The signature (or some part of it) was missing from the recieved message, which caused a failure. This indicates that either the header was formed incorrectly or it was modified after being sent.

Test Your Email

Making changes to your DKIM signature or modifying how you send emails can have an adverse effect on how your email displays. That’s why it’s important to test your email before you hit “send.” With Email on Acid, you can start testing today with our free, seven-day trial.

Start testing today!

28 thoughts on “What Is DKIM? Everything You Need to Know About Digital Signatures”

  1. Fantastic blog! I’m impressed, I must say. Really rarely do I encounter a blog that’s both informative and entertaining, and let me tell you, you have hit the nail on the head. Your blog is outstanding; the issue is something that not a lot of people are talking intelligently about it. I’m really happy that I stumbled across this in my search for something relating to this.

  2. Its a very informative DKIM digital signature.. some point i didn’t know before… i m so happy to get this all tips i will keep this all tips in my mind…

  3. I am glad to find your post, I have a query the
    PUBLIC KEY o RSA PRIVATE KEY or placed in cpanel ssh / shell Access because my the get this dkim domainkeys = neutral (no sig)

    you please help me

  4. Suraj and Richard,
    Sorry, but that’s a bit out of our expertise. I only know how to troubleshoot DKIM deliverability problems, not how to implement DKIM. Good luck!

  5. There is a big problem with legit email discussion lists and Yahoo!’s implementation of DKIM & DMARC.

    It’s no exaggeration to say this will wreck mailing lists, including ours. We are having to block posting from list members using Yahoo! addresses.

    Our list host emwd.com has implemented some cunning workarounds for Mailman, but they damage the usability of the list.

    See http://www.ietf.org/mail-archive/web/ietf/current/msg87153.html

  6. Hi All,

    I have some issues configuring DKIM, when I send a mail to yahoo and check the header get the following error message:”domainkeys=neutral”

    Authentication-Results: mta1119.mail.ne1.yahoo.com from=bungalow.eu; domainkeys=neutral (no sig); from=bungalow.eu; dkim=pass (ok)
    Received: from 127.0.0.1 (EHLO mail.bungalow.eu) (87.230.58.24)
    by mta1119.mail.ne1.yahoo.com with SMTP; Wed, 11 Jun 2014 11:29:14 +0000
    dkim-signature:v=1; c=relaxed/relaxed; h=from:to:subject:date:message-id:mime-version:content-type;
    d=bungalow.eu; s=mail; a=rsa-sha1;
    bh=WKut09KVySEnRbVL4eNskip/ceI=;
    b=jhUK6L1apOTAkrzYm2BmK9igx+uiSKcJw9/fttWiZWZX8rDPdXyEOmCJdt21BSZ/0
    PzxdcSBZedryzcdDH66V3kr40p+7dPPLrsljEAe4BJBZlAJh4wXS9pp4YVXGfu0kagP
    wJGVrMmQMnX0UcpyITogGt4hR9cClHx14/UNYaY=;

    COuld somebody help me?

  7. i have problems with the dkim signature being reported by an online tester as not valid i have tried different domains but still to no avail can you help

  8. You make some great points and I don’t think I could have made them any better. Thanks for the good information !

  9. hi
    i have problem of when i send small html content then dkim is passed but when i send long html then dkim is nuterial please help me anyone whats the problm is this
    thnks..

  10. I have DKIM setup on our mailserver. All online DKIM signature testing tools, and email main players, all verify the received emails with DKIM=PASS…..all EXCEPT MICROSOFT (outlook, hotmail etc). Always the ones to ‘do things against the tide’. Anyone heard of this before or found a solution? (MS definitely on up for explaining why. Ive tried!)

  11. hey why sometimes we find two dkim signatures !
    dkim-signature:v=1; c=relaxed/relaxed; h=from:to:subject:date:message-id:mime-version:content-type;
    d=exemple.com; s=mail; a=rsa-sha1;
    bh=WKut09KVySEnRbVL4eNskip/ceI=;
    b=jhUK6L1apOTAkrzYm2BmK9igx+uiSKcJw9/fttWiZWZX8rDPdXyEOmCJdt21BSZ/0
    PzxdcSBZedryzcdDH66V3kr40p+7dPPLrsljEAe4BJBZlAJh4wXS9pp4YVXGfu0kagP
    wJGVrMmQMnX0UcpyITogGt4hR9cClHx14/UNYaY=;
    dkim-signature:v=1; c=relaxed/relaxed; h=from:to:subject:date:message-id:mime-version:content-type;
    d=exemple1.com; s=mail; a=rsa-sha1;
    bh=WKut09KVySEnRbVL4eNskip/ceI=;
    b=jhUK6L1apOTAkrzYm2BmK9igx+uiSKcJw9/fttWiZWZX8rDPdXyEOmCJdt21BSZ/0
    PzxdcSBZedryzcdDH66V3kr40p+7dPPLrsljEAe4BJBZlAJh4wXS9pp4YVXGfu0kagP
    wJGVrMmQMnX0UcpyITogGt4hR9cClHx14/UNYaY=;
    even we have 1 sender

    1. Hey Amine!
      If you see 2 DKIM signatures – that means, that multiple domains are used to send through one single infrastructure, that is why there’s a signature for child domain reffered in SPF and mother domain (probably service one), which is revealed during sending.

      In most cases it means, that actual domain (example1.com) have to be linked in terms of domain reputation and recognition as 1 infrastructure.
      This approach is commonly used by ESPs to let ISP know ,that infrastructure belongs to mother domain without additional reverse lookup. It helps ISP to collect domain based reputation metrics more precisely. Some ISPs allow to collect postmaster data and FBLs , based on the Double dkim signature as a kind of authorization, since it’s relevant for various domains ESP customers use.

  12. Hi,

    I have created a txt record into my DNS and saved the public key for DKIM. Now, where do I need to put my private key. Should it be added into the header of mail message, I am unable to do that? Am I on the wrong way?

  13. Hi Arpit,

    As far as I’m aware, as long as you send from the domain where you’ve set up your DKIM public key, you should be fine!

    Let me know how you get on.

    Cheers!

  14. Hi Arpit

    Assuming you have admin rights on your mail server – the private key is set up on the mail server itself. It is used by the server to form the DKIM signature when it hashes the mail body and headers.

  15. Will DKIM work with third part email servers. For example, I send all my email through comcast(labeled as from info@kabusa.com ) not the KABUSA server. How do I add the DKIM signature to outlook? I just cannot fully understand this.

  16. You don’t add it to outlook. The DKIM signature is added by an outbound mail server. If you’re using a third party server, then you need to consider setting up a local mail server which supports DKIM e.g hmailserver and then you set it up to relay the outbound mail through the third party server.

  17. i have problem with DKIM_SIGNED header and DKIM_VALID this header is present.
    I didnt done anything for DKIM,why this is comming

Leave a Reply

Your email address will not be published. Required fields are marked *

Free Email Goodies