DKIM body hash verification failures are primarily caused by alterations to the email content after the DKIM signature has been applied. These modifications can be due to various factors, including text encoding issues (particularly with Outlook), line wrapping, character set conversions, and the addition of footers, disclaimers, or content by auto-responders, forwarding systems, list servers, or even the receiving mail server. Experts advise ensuring the DKIM signing process occurs after all intended modifications, and that consistent encoding and line endings are used. Troubleshooting involves identifying the source of the modification through header analysis, and considering regenerating DKIM keys or comparing results with Gmail as a benchmark.
7 marketer opinions
The primary cause of DKIM body hash verification failures is modification of the email content after the DKIM signature has been applied. These modifications can be introduced by various sources, including the sending mail server, intermediate servers, receiving email clients, or automated processes like auto-responders or footer insertion. Troubleshooting involves identifying where and how the message content is being altered and ensuring the DKIM signing process occurs after all modifications.
Marketer view
Email marketer from Mailhardener responds that if the DKIM signature fails due to body hash mismatch, verify if the sender is correctly signing the email using the correct DKIM key. It also advises to check for possible tampering during transit.
29 Apr 2023 - Mailhardener
Marketer view
Email marketer from Super User responds that the 'body hash did not verify' error indicates the message body changed after DKIM signing. This can be due to modifications by mail servers or email clients. Examine the message headers to track the path and identify any potential modification points.
9 Nov 2024 - Super User
5 expert opinions
DKIM body hash verification failures primarily stem from content modifications occurring after the DKIM signature is applied. These changes can be due to various factors, including text encoding issues (specifically with Microsoft Outlook), modifications by auto-responders, forwarding systems, list servers, or even the receiving mail server. Troubleshooting involves identifying the source of the modification and ensuring that the signing process occurs after any content alterations. Utilizing Google as a benchmark can help isolate issues specific to certain email providers like Microsoft.
Expert view
Expert from Email Geeks explains that if DKIM body hash verification is failing in both Gmail and Outlook, the signer is likely broken or the message is being modified in transit. Regenerating the public/private key pair is the first suggestion.
15 Dec 2023 - Email Geeks
Expert view
Expert from Email Geeks shares that Google is a good benchmark for checking email authentication due to its robust system and easy result retrieval. Problems at Microsoft should be verified against Google first.
19 Jul 2023 - Email Geeks
3 technical articles
DKIM body hash verification failures are primarily caused by alterations to the email body after the DKIM signature has been applied. These changes, even minor ones like whitespace, character set conversions, line wrapping by MTAs, or the addition of disclaimers, invalidate the signature. The core issue is the sensitivity of DKIM signatures to any modification of the message content after signing.
Technical article
Documentation from RFC 6376 specifies that DKIM signatures are sensitive to even minor changes in the message body. Any modification, including whitespace changes, character encoding differences, or the addition of content, will cause the body hash verification to fail.
2 Feb 2025 - RFC Editor
Technical article
Documentation from OpenDKIM Project suggests that if a DKIM signature verification fails due to body hash mismatch, ensure that the message content hasn't been modified by intermediate servers or mail clients. Check for any transformations like adding footers, changing character encoding, or altering line breaks.
12 Mar 2023 - OpenDKIM.org
Can email signatures, especially via Exclaimer, cause SPF or DKIM failures and impact email delivery?
How can a phishing email pass SPF and DKIM authentication checks?
How do I align SPF and DKIM in Salesforce Service Cloud, and is it necessary if DKIM is already aligned?
How do I fix DKIM alignment errors and configure DKIM signing for a custom domain in Microsoft 365 and is include:spf.mtasv.net required for mailchimp?
How do I fix DMARC failures with OpenAir due to lack of DKIM signing?
How do I generate an a=rsa-sha256 key for DKIM?
How do I interpret SpamAssassin DKIM test results and troubleshoot DKIM signature issues?
How do you analyze DMARC reports using report-uri.com?
What is DKIM oversigning, how does it work, and why is it important for email authentication?