- Home
- DKIM Record Checker
With DKIM Record Checker, you can confirm that your DKIM record is properly configured and published in your DNS, helping to prevent email spoofing and improve deliverability
Stronger email security
Verify and Resolve Issues with Your DKIM Record
Authenticate your outbound emails using DKIM (DomainKeys Identified Mail). DMARCtron’s DKIM Checker is a robust tool designed to test and validate the correct implementation of your domain’s DKIM record. By analyzing the email header, the tool confirms that the message has been signed with the domain’s private key and verifies the integrity of the signature.
This process enables domain owners to take responsibility for messages in transit, ensuring they originate from the specified domain and remain unaltered during transmission. A comprehensive DKIM record check identifies syntax errors and validates the presence of a corresponding public key for the given selector in your DNS.
Once the lookup results are available, you can address any identified issues and take proactive steps to enhance your email authentication framework. Leveraging tools like DMARCtron ensures your DKIM configuration is accurate, secure, and optimized for maximum deliverability and protection against email spoofing.

- Find your answer
Read most frequent questions
DKIM Tag Explanations
DKIM Record Checker will display the following tags.
TAG | TAG DESCRIPTION |
---|---|
v | The version tag indicates the version of DKIM, and should always be set on 1. |
p (required) | The public key tag is a string of characters generated during DKIM setup. Leaving the value empty deems it invalid. |
t | This tag lists the flags in a colon-separated sequence. There are two defined flags: y and s. Undefined flags must be ignored. |
s | This tag lists record-applicable service types. If the appropriate service type misses, the receiving servers must ignore the tag. Same goes with the unrecognized service types. |
h | This tag defines the acceptable hash algorithms. In its default state, it allows all. Unrecognized algorithms must be ignored. The sender is responsible for determining each entry in the list. |
k | This is the key type tag with a default value of "rsa". It's crucial that both sending and receiving servers support this value. |
n | This tag acts like an optional note field for administrators. We recommend that you use this field only if necessary. |
Q. What Is a DKIM Record?
A DKIM (DomainKeys Identified Mail) record is a DNS entry in TXT format that plays a critical role in email authentication. It contains two essential components: the selector and the public key. This record is stored in the DNS server of the domain used for sending emails.
The selector is a unique identifier that specifies which private key was used to sign the email message. It is included in the email header alongside the cryptographic signature. The public key, on the other hand, is used by receiving mail servers to verify the authenticity and integrity of the email’s signature, ensuring the message has not been tampered with during transit.
In this example, mailo is the selector prefix, and dmarctron.com is the domain name. The v=DKIM1 tag indicates that this is a DKIM record, k=rsa specifies that RSA encryption is used, and p= includes the public key for the domain. Upon receiving an incoming email, the recipient server retrieves the DKIM record from the DNS and uses it to verify its authenticity.
Q. What Are DKIM Keys? How Does DKIM Work?
DKIM (DomainKeys Identified Mail) is an advanced email authentication protocol designed to verify the authenticity of email messages and protect against email spoofing, phishing, and unauthorized tampering. It achieves this by employing cryptographic signatures to ensure the integrity and origin of an email.
How DKIM Works
DKIM operates through a public/private key pair mechanism:
- Private Key: A private key is securely stored on the sender’s mail server or by their Email Service Provider (ESP). This key is used to generate a digital signature, which is added to the header of outgoing email messages.
- Public Key: The corresponding public key is published in the sender’s DNS as a TXT record under a specific selector (e.g.,
selector._domainkey.yourdomain.com
). This allows recipient mail servers to retrieve the key and validate the email’s signature. - Signature Validation: Upon receiving the email, the recipient’s mail server retrieves the public key from the sender’s DNS and uses it to verify the cryptographic signature in the email header. If the signature matches, the email is confirmed to have originated from the claimed domain and remains unaltered during transit.
Key Components of DKIM
- Selector: A unique identifier that specifies which private/public key pair was used to sign the email. It is included in the email header and helps locate the correct public key in the DNS.
- Public/Private Key Pair: The private key signs the email, while the public key verifies it. These keys are generated by the domain owner or ESP and must remain secure to prevent misuse.
Implementation Steps
To implement DKIM, domain owners must:
- Generate a public/private key pair.
- Publish the public key in a DNS TXT record under the domain name.
- Configure their email server or ESP to sign outgoing emails using the private key.
In cases where third-party ESPs (e.g., Google Workspace, Microsoft 365, SendGrid) manage email delivery, they typically handle the private key internally. Users must retrieve the public key from the ESP’s portal or contact their support team for assistance.
Benefits of DKIM
- Message Integrity: Ensures that the email content has not been altered during transmission.
- Sender Authentication: Verifies that the email originates from the claimed domain, enhancing trust and deliverability.
- Complementary to SPF and DMARC: When combined with SPF and DMARC, DKIM strengthens email security, improves sender reputation, and reduces the risk of cyberattacks such as phishing and email fraud.
Why DKIM Matters
DKIM plays a critical role in modern email security frameworks. By ensuring message authenticity and integrity, it supports DMARC enforcement, boosts email deliverability, and protects both senders and recipients from malicious activities. Tools like DMARCtron provide comprehensive solutions for validating DKIM and SPF records, enabling organizations to maintain robust email authentication practices and safeguard their domains effectively.
Q. Why Do You Need DKIM, DMARC, And SPF Checks?
DKIM (DomainKeys Identified Mail), DMARC (Domain-based Message Authentication, Reporting, and Conformance), and SPF (Sender Policy Framework) are foundational email authentication protocols designed to combat email spoofing, enhance security, and improve email deliverability. Email spoofing, a tactic commonly employed by spammers and cybercriminals, involves sending fraudulent emails that appear to originate from a legitimate sender. These protocols empower email service providers and recipients to verify the authenticity of an email, ensuring it was sent by the domain owner or an authorized sender.
Benefits of Implementing SPF, DKIM, and DMARC
Enhanced Email Deliverability:
By authenticating your emails, you increase the likelihood that email service providers will deliver your messages to recipients’ inboxes rather than flagging them as spam or rejecting them outright. This ensures your communications reach their intended audience.Protection Against Spoofing and Fraud:
These protocols prevent unauthorized parties from exploiting your domain to send malicious or fraudulent emails. By verifying the legitimacy of your emails, you safeguard your brand’s reputation and reduce the risk of phishing attacks.Improved Email Reputation Management:
DMARC provides critical insights into how your domain is being used for email communication. It enables you to monitor email traffic, identify potential threats, and take proactive measures to protect your domain’s reputation.
Why Implementation is Essential
Adopting SPF, DKIM, and DMARC is vital for securing your domain against email-based threats and ensuring the integrity of your email ecosystem. These protocols not only protect your organization and recipients from spoofing and fraud but also enhance trust with email service providers, improving overall deliverability. Tools like DMARCtron streamline the implementation and monitoring of these protocols, empowering organizations to maintain robust email authentication practices and mitigate risks effectively.
By prioritizing the deployment of SPF, DKIM, and DMARC, you can fortify your domain’s defenses, uphold your brand’s credibility, and ensure seamless communication with your audience.
Q. Why Does DKIM Lookup Matter?
DKIM record lookup matters because it gives you information on DKIM issues. Knowing the problems is the first and most crucial step before building your email authentication action plan.
Q. What Does DKIM Lookup Do?
DMARCtron’s DKIM Checker:
- Checks if the DKIM TXT record is published in DNS for the domain;
- Checks the published DKIM TXT record syntax;
- Validates DKIM public key associated with selector.
It returns warning messages for each problem it finds in your DKIM record.
Q. How To Test DKIMkey?
Test DKIM Keys in 4 Steps
Inspect Email Headers for DKIM Validation
Begin by examining the email headers for theDKIM-Signature
field. Verify thed=
tag to confirm that the email was signed using your domain’s DKIM key. Additionally, check theAuthentication-Results
header to determine whether the email passed or failed DKIM validation. This step provides an initial assessment of your DKIM implementation.Validate DKIM Record Syntax and Configuration
Use a reliable DKIM checker tool, such as DMARCtron’s DKIM Checker , to validate the syntax and configuration of your public key. This ensures that your DKIM record is error-free and properly published in your DNS. Consistency is key—stick to one trusted tool to avoid discrepancies in results.Investigate Specific Emails with DKIM Issues
Leverage DMARCtron’s Email Investigate Tool to analyze specific email messages with DKIM-related issues. This tool provides pass or fail results for DKIM validation, helping you identify whether DKIM is functioning correctly. While it does not delve into granular details like signature algorithms or public key mismatches, it serves as a valuable starting point for troubleshooting.Monitor DMARC Aggregate Reports for Ongoing Compliance
Regularly review your DMARC aggregate reports to ensure that your email authentication protocols, including DKIM, are functioning as intended. These reports offer insights into DKIM performance and highlight any misconfigurations. If issues arise, promptly update your DKIM keys in your DNS records and take corrective actions to maintain a secure and reliable email infrastructure.
By following these steps, you can systematically test and optimize your DKIM implementation, ensuring robust email authentication and protection against spoofing and tampering. Tools like DMARCtron simplify this process, enabling consistent monitoring and actionable insights for your email security strategy.
Q. How To Check DKIM via “nslookup” From the Command Line?
You can check the DKIM record for a domain using the nslookup command in the console or command line. Here’s how:
- Open the console or command line on your computer.
- Type nslookup -q=txt <selector>._domainkey.<domain> where <selector> is the DKIM selector and <domain> is the domain name.
- Press Enter to execute the command.
- The output will display the DKIM record for the domain, including the public key and other information.
Q. How To Check DKIM via the Command Line With the Dig?
To check the DKIM record for a domain using the dig command, follow these steps:
- Open the console or command line on your computer.
- Type dig <selector>._domainkey.<domain> TXT where <selector> is the DKIM selector and <domain> is the domain name.
- Press Enter to execute the command.
- The output will display the DKIM record for the domain, including the public key and other information.
Q. How to check DKIM record in your DNS?
Here’s what you need to do to check your DKIM record manually:
- Go to your DNS provider and login
- Navigate to the records page and search for a TXT or CNAME type record with the Host / Name similar to the following string: [selector]._domainkey. yourdomain.com
This method gives the same result as inputting your domain and selector in our DKIM record checker tool.
Q. How To Analyze DKIM Selector From DMARC Aggregate Reports?
DMARC Aggregate reports contain a specific tag with ”selector name”, which helps you easily identify your DKIM signature Selector name. We also convert this data into an easy-to-read format where you can identify your DKIM Selector name under your dashboard’s “DKIM Auth. Results” tab.
Q. How Long Does It Take To Set Up DKIM?
Factors Influencing the DKIM Setup Process
The process of implementing DKIM (DomainKeys Identified Mail) varies based on several factors, including your familiarity with email authentication protocols, the complexity of your email infrastructure, and the specific policies of your email service provider or hosting company.
Key Steps in Setting Up DKIM
Generate a Public and Private Key Pair:
The first step involves creating a cryptographic key pair. The private key is used to sign outgoing emails, while the public key is published in your DNS to enable recipient servers to verify the authenticity of your messages.Publish the Public Key as a DNS Record:
Add the public key to your domain’s DNS as a TXT record under a designated selector (e.g.,selector._domainkey.yourdomain.com
). This allows receiving mail servers to retrieve the key for signature validation.Configure Your Email Server or Service:
Configure your email server or third-party email service to sign outgoing messages using the private key. This ensures that all emails sent from your domain include a valid DKIM signature.
DKIM Setup for Third-Party Providers
If you utilize a third-party email service provider (ESP), such as Google Workspace or Microsoft 365, the DKIM setup process is typically streamlined and well-documented. These providers often offer step-by-step instructions, making the process quick and straightforward—usually taking only a few minutes to complete.
DKIM Setup for Self-Managed Infrastructures
For organizations managing their own email servers, the DKIM setup process can be more intricate and time-intensive. It requires:
- Generating the cryptographic keys using tools like OpenSSL.
- Publishing the public key in DNS with precise syntax.
- Configuring the mail server software (e.g., Postfix, Exchange) to sign outgoing emails with the private key.
Depending on your technical expertise and the complexity of your infrastructure, this process may take anywhere from a few hours to several days.
Ongoing Monitoring and Optimization
Setting up DKIM is just the beginning. To ensure its effectiveness and maintain optimal email deliverability:
- Monitor DKIM Performance: Regularly review DMARC aggregate reports to confirm that DKIM signatures are being validated correctly.
- Address Configuration Issues: Promptly resolve any issues, such as DNS misconfigurations or key mismatches.
- Rotate Keys Periodically: Update your DKIM keys periodically to adhere to security best practices and minimize the risk of compromise.
Time Considerations
- Third-Party ESPs: Typically quick and straightforward, requiring minimal technical expertise.
- Self-Managed Servers: More complex and time-consuming, necessitating advanced technical knowledge and careful planning.
It is important to recognize that while the initial DKIM setup is a critical step, ongoing monitoring and adjustments are equally vital to maintaining robust email authentication and ensuring consistent deliverability. Tools like DMARCtron provide comprehensive solutions for validating, monitoring, and optimizing DKIM configurations, empowering organizations to protect their domains and enhance email security effectively.
Q. What Are Some Common DKIM Issues?
Common Causes of DKIM Failures
DNS Configuration Errors:
DKIM relies on the accurate setup of DNS TXT records, including the DKIM public key and policy records. Misconfigurations such as missing records, incorrect syntax, or improperly formatted entries can lead to DKIM validation failures. Ensuring precise DNS configuration is critical for successful DKIM implementation.Insufficient Key Length:
The DKIM key length must meet minimum cryptographic standards, typically requiring at least 1024 bits. However, many email providers now recommend or mandate longer keys (e.g., 2048 bits) for enhanced security. Using a key that is too short may result in DKIM validation failures and compromise email deliverability.Mismatched Domain Names:
DKIM requires alignment between the domain name used in the DKIM signature (d=
tag) and the domain in the email’sFrom
address. A mismatch between these domains will cause DKIM validation to fail. This alignment is a crucial factor for achieving DMARC compliance and ensuring consistent email authentication.Unsupported Signing Algorithm:
DKIM supports various signing algorithms, but not all email providers support every algorithm. Using an unsupported or outdated algorithm (e.g., RSA-SHA1 instead of RSA-SHA256) can lead to DKIM failures. It is essential to verify the compatibility of your chosen algorithm with major email providers.Message Body Modifications:
DKIM signs both the email headers and the message body. If the email content is altered after signing—such as through gateway processing, content filtering, or formatting changes—the DKIM signature will no longer match, resulting in validation failure. This issue often arises when emails pass through intermediate systems that modify the content before reaching the recipient’s mail server.
Mitigating DKIM Failures
To prevent these issues:
- Regularly validate your DNS records using tools like DMARCtron to ensure accuracy and compliance.
- Use sufficiently long DKIM keys (preferably 2048 bits) to meet modern security standards.
- Ensure proper DKIM alignment by verifying that the
d=
domain matches theFrom
address domain. - Select widely supported signing algorithms, such as RSA-SHA256, to maximize compatibility.
- Minimize post-signing modifications to email content by configuring gateways and filters to preserve the integrity of signed messages.
By addressing these potential pitfalls, you can maintain robust DKIM functionality, enhance email deliverability, and strengthen your domain’s protection against spoofing and tampering. Tools like DMARCtron simplify the process of monitoring and troubleshooting DKIM configurations, ensuring seamless email authentication and compliance.
Q. How many DKIM records can I have?
As many as you want. The only limitation is how many DKIM records your DNS provider can handle. Technically, each DKIM record can be associated with a unique selector, and it’s imperative to use multiple selectors for each email sending service.
Q. How To Investigate DKIM Issues?
There are several effective approaches to diagnosing and resolving DKIM-related issues:
Verify DKIM Record and Public Key Implementation:
Use a reliable tool like DMARCtron’s DKIM Lookup to validate the correctness of your DKIM record and ensure the public key is accurately published in your DNS. This step helps identify syntax errors, missing records, or misconfigurations that could lead to DKIM failures.Analyze DMARC Reports for DKIM Insights:
Leverage DMARC reports to gain detailed insights into DKIM validation results, including passes and failures. Tools such as DMARCtron’s Aggregate Report Analyzer simplify this process by providing actionable data on email authentication performance, helping you pinpoint DKIM-related issues.Examine Email Headers for DKIM-Signature Details:
Retrieve and analyze theDKIM-Signature
field from email headers to evaluate the underlying results. This allows you to confirm whether the email was signed correctly and identify potential mismatches or validation errors.Verify Third-Party ESP Configurations:
If you’re using third-party Email Service Providers (ESPs) and obtained the DKIM public key from them, ensure all necessary configurations have been completed in their portal. Double-check that the correct public key is published in your DNS and that the private key is properly integrated into the ESP’s email-sending process.
By systematically applying these methods, you can effectively diagnose and resolve DKIM issues, ensuring robust email authentication and improved deliverability. Tools like DMARCtron streamline the investigation process, offering comprehensive solutions for monitoring, analyzing, and optimizing your DKIM implementation.
Q. Is DKIM Part of the DMARC Protection?
Yes. DKIM is one of the two authentication protocols (SPF is the other one) that DMARC relies on. At least one of them should pass for a successful DMARC check.
Q. If I Have an SPF, Do I Have To Implement DKIM?
Absolutely. Both SPF and DKIM play a major role in email authentication. In fact, unlike SPF, DKIM tends to survive email forwarding cases, so it’s of utmost importance to set it up.
Haven’t found an answer to your query?
Contact Us
- Tools