DKIM authentication failures can stem from various factors. Security solutions like Barracuda and Proofpoint, often deployed in front of destination domains, may alter email content, impacting DKIM validity. Email forwarding, especially through mailing lists, modifies headers/body, thus invalidating the DKIM signature. Filters should verify DKIM before modifying the email body. Interoperability problems can arise from senders' practices violating protocol standards. Incorrect DNS configurations, character encoding issues, and problems with the DKIM key itself are other potential causes. ARC (Authenticated Received Chain) helps preserve authentication across hops if filters trust the results. DMARC policies are strict with DKIM and SPF alignment. The root cause of these problems need to be understood to ensure the best deliverability.
11 marketer opinions
DKIM authentication failures can occur for several reasons, particularly when dealing with certain ISPs and receivers like Barracuda and Proofpoint. These failures often stem from modifications made to email content during transit by intermediaries, such as security gateways that alter URLs or add disclaimers. Incorrect DNS configuration, character encoding issues, and problems with the DKIM key itself also contribute. Forwarding emails, especially through mailing lists, can invalidate DKIM signatures due to header or body modifications. While a passing SPF record may sometimes mitigate the impact, it is crucial to ensure both SPF and DKIM pass for optimal deliverability, especially with stricter DMARC policies. Solutions like ARC (Authenticated Received Chain) and whitelisting sender IPs can help address these issues.
Marketer view
Email marketer from an Email Marketing Forum explains that sometimes DKIM failures are seen as less important if SPF is passing. However, for maximum deliverability, both SPF and DKIM should pass. They suggest checking DNS records for errors.
7 May 2024 - Email Marketing Forum
Marketer view
Email marketer from Mailhardener shares that ARC (Authenticated Received Chain) is designed to address DKIM failures in forwarding scenarios by preserving authentication results across multiple hops. ARC allows receiving servers to trust the original authentication status even if the DKIM signature is broken by an intermediary.
23 May 2024 - Mailhardener
5 expert opinions
DKIM authentication failures can arise for various reasons, often pointing to underlying deliverability issues. A core principle is that filters should ideally verify DKIM signatures before modifying email bodies. Consistent failures with specific MTAs may signal interoperability problems, where certain sender practices, while acceptable to some, technically violate protocol standards. Email forwarding, particularly via mailing lists, commonly alters headers or bodies, thus invalidating DKIM signatures. Addressing these issues often involves understanding the root cause and working with ESP support. ARC (Authenticated Received Chain) is frequently proposed as a solution to preserve authentication results across multiple email hops, provided that filters reliably trust ARC results.
Expert view
Expert from Email Geeks states that any sensible filter should be doing DKIM verification _before_ they modify the body.
26 Aug 2024 - Email Geeks
Expert view
Expert from Email Geeks suggests ARC might be a useful solution to DKIM authentication issues, especially if filters trust the ARC results.
26 Nov 2021 - Email Geeks
3 technical articles
DKIM authentication failures can occur due to email forwarding, as the modification of message headers or the body by the forwarder invalidates the DKIM signature. ARC (Authenticated Received Chain) is crucial for preserving authentication results across multiple hops. DKIM failures can also lead to DMARC failures if the message doesn't align with SPF or other authentication mechanisms, potentially resulting in email rejection or being marked as spam. Changes made in transit, such as adding disclaimers or converting character encodings, also invalidate the DKIM signature, as outlined in the DKIM standard (RFC6376).
Technical article
Documentation from Microsoft Learn explains that DKIM failures can occur due to email forwarding, where the forwarder modifies the message headers or body, invalidating the DKIM signature. It highlights the importance of ARC (Authenticated Received Chain) to preserve authentication results across multiple hops.
20 Oct 2021 - Microsoft Learn
Technical article
Documentation from RFC Editor (RFC6376, the DKIM standard) explains that DKIM signatures can fail verification if the message body or headers are modified in transit. Changes made by intermediaries, such as adding disclaimers or converting character encodings, will invalidate the signature.
24 Sep 2022 - RFC Editor
Can Proofpoint implementation and MX record changes during IP warming affect email deliverability?
How can I contact ProofPoint support to resolve email delivery issues?
How can I resolve Barracuda blocklist issues and improve email deliverability?
How can I resolve email deliverability issues with Proofpoint when emails are not bouncing or going to spam?
How do I contact Proofpoint about IP address listing issues and what information should I provide?
How do Mimecast and Proofpoint scrutinize senders, and what best practices can improve inbox placement beyond whitelisting?