Suped

Does BIMI rely on DNSSEC for certificate validation?

BIMI, or Brand Indicators for Message Identification, is an email standard that allows brands to display their logos next to their messages in the inbox. It’s a powerful tool for building brand recognition and trust. But for it to work, it leans heavily on other, more established email authentication protocols. As many sources point out, BIMI's foundation is built upon DMARC, which in turn relies on SPF and DKIM. A common question I see is about the more granular technical requirements, specifically concerning DNS security. Does BIMI require DNSSEC for its certificate validation process? The answer is nuanced, but let's break it down.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

The authentication chain: from DMARC to BIMI

Before you can even think about BIMI, your domain must be properly authenticated. BIMI doesn’t operate in a vacuum; it’s the final piece of a larger email authentication puzzle.

www.astralinternet.com logo
Astral Internet Canada says:
Visit website
How does BIMI work? BIMI doesn't work on its own. It relies on DMARC, which itself depends on SPF and DKIM. In other words, before going...

This means you need to have SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) set up correctly. On top of that, you must have a DMARC (Domain-based Message Authentication, Reporting, and Conformance) policy in place. Critically, this DMARC policy can't just be for monitoring; it needs to be at an enforcement level.

www.pipeten.com logo
Pipe Ten says:
Visit website
Before enabling BIMI , your domain must have a DMARC policy with a p=quarantine or p=reject directive. This enforces email authentication and is ...

This enforcement policy tells receiving mail servers to either quarantine or reject emails that fail authentication, proving that you have control over your domain's email sending practices. Without this, as AutoSPF rightly states, "BIMI will not work because it relies on DMARC to validate the legitimacy of your emails." Once these prerequisites are met, a mail server that supports BIMI will look for a special DNS record to find your logo.

What is a Verified Mark Certificate (VMC)?

For most major mailbox providers like Gmail and Apple Mail, simply having DMARC enforcement isn't enough to display your BIMI logo. They also require you to have a Verified Mark Certificate, or VMC.

A VMC is a digital certificate that proves your ownership of the logo you want to display. It's similar in concept to an SSL certificate for a website.

campaignrefinery.com logo
Campaign Refinery says:
Visit website
The VMC, which serves as a digital certificate, attests to the authenticity and ownership of the brand. As part of email authentication, BIMI ...

To get a VMC, you must go through a verification process with a recognized Mark Verifying Authority (MVA). These authorities check that your logo is trademarked and that you have the legal right to use it.

www.badsender.com logo
Badsender says:
Visit website
BIMI will rely on MVA (Mark Verifying Authorities such as Digicert or Entrust) to check logo ownership and provide proof of verification.

The VMC file itself is then referenced in your BIMI DNS record, alongside the URL for your logo. When a mail provider retrieves your BIMI record, it also fetches and validates this certificate.

Where DNSSEC fits into the picture

This brings us to the central question: is DNSSEC required for this process? The entire BIMI mechanism relies on DNS. Your BIMI record is a TXT record in your domain's DNS settings, just like your SPF and DMARC records.

www.mailgun.com logo
Mailgun says:
Visit website
Like other email specifications that are connected to the authentication process, BIMI is a DNS TXT record. When you have BIMI set up correctly,...

DNS, by default, is not secure. A sophisticated attacker could potentially intercept a DNS query and return a fraudulent response, a technique known as DNS spoofing or cache poisoning. In the context of BIMI, an attacker could point a mail server to a fake logo and a fraudulent VMC.

This is where DNSSEC (DNS Security Extensions) comes in. DNSSEC adds a layer of cryptographic security to the DNS, ensuring that the response a server receives is authentic and has not been tampered with. It protects the "lookup" part of the process.

So, does BIMI rely on DNSSEC for certificate validation?

  • For certificate validation itself: No. The validation of the VMC file is a standard cryptographic process. The mail server checks the certificate's signature, its expiration date, and its chain of trust back to a root authority. This process doesn't directly involve DNSSEC.
  • For the integrity of the BIMI lookup: Yes, implicitly. While the BIMI standard itself might not strictly mandate DNSSEC for all implementations, it is a critical component for ensuring the entire system is secure. Without DNSSEC, the trust established by the VMC can be undermined because an attacker could hijack the DNS lookup that points to the VMC.

Many security-conscious providers and implementers consider DNSSEC a best practice, if not an outright requirement, for a secure BIMI setup. A user on the Let's Encrypt community forum, for instance, noted their implementation involved "DNS By Cloudflare with DNSSEC" as part of their setup. This shows that in practice, the two technologies are often used together for a robust implementation.

Tying it all together

In summary, while DNSSEC is not technically part of the VMC validation algorithm, it is a crucial security measure for the DNS lookup that precedes it. Think of it this way: the VMC is like a passport that proves your logo's identity, but DNSSEC is the security guard who ensures you are looking at the real passport and not a forgery.

For anyone serious about implementing BIMI, I strongly recommend deploying DNSSEC on your domain. It protects the integrity of your BIMI records, enhances the overall security of your email program, and ensures that the trust you build with a VMC is not easily compromised.

Start improving your email deliverability today

Get started