Suped

Does DKIM require a specific port for verification?

It's a common point of confusion, but the short answer is no. DKIM (DomainKeys Identified Mail) itself does not require a specific port to be opened on your mail server for verification to work. The verification process is handled entirely through DNS lookups, which use their own standard ports, not through a direct connection to your email server on a special port.

Let's clear up how this process works and where the confusion about ports often comes from.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

How DKIM verification actually works

DKIM is fundamentally a system of digital signatures. Its goal is to allow a receiving mail server to verify that an email claiming to be from a specific domain was truly authorized by the owner of that domain. The entire verification mechanism relies on public key cryptography and the Domain Name System (DNS).

www.uriports.com logo
URIports says:
Visit website
It works by allowing the sending domain to sign its outgoing emails with a unique cryptographic signature, which recipients can verify using a public key...

Here’s a simplified breakdown of the process:

  • Signing: When your server sends an email, it uses a private key that only it knows. It creates a unique signature based on the content of the message and adds this signature as a header in the email.
  • Publishing: You publish the corresponding public key as a TXT record in your domain's DNS. This is what an external server will look for.
  • Verifying: When a recipient's mail server gets the email, it reads the DKIM signature header. The header tells the server which domain signed the message and which key to look for (using a 'selector'). The server then performs a DNS lookup to fetch your public key. If the public key correctly decrypts the signature, the email is verified.

As described in the official RFC 6376 specification, this process allows the domain owner to "claim some responsibility for a message." The key takeaway is that the verification step is a DNS query, which typically uses port 53. It is not a connection back to your mail server on a special DKIM port.

The confusion with SMTP ports

The misunderstanding often arises because email delivery itself is very much dependent on ports. Mail servers use the Simple Mail Transfer Protocol (SMTP) to send and receive emails, and SMTP operates over specific network ports.

www.praetorian.com logo
Praetorian says:
Visit website
This communication can be sent in plaintext on port 25, using SSL on port 465, or over TLS on port 587. In certain cases cloud providers may...

The common SMTP ports you hear about are:

  • Port 25: The default port for relaying email between mail servers.
  • Port 465: A port for secure SMTP (SMTPS), which wraps the connection in SSL/TLS.
  • Port 587: The standard port for email clients to submit messages for sending, usually requiring authentication.

While your email travels across the internet using one of these ports, the DKIM verification is an independent check performed by the receiving server. That check looks at your DNS records, not at a port on your mail server.

DNS is the key to email authentication

DKIM is just one piece of the modern email authentication puzzle. It works alongside SPF (Sender Policy Framework) and DMARC (Domain-based Message Authentication, Reporting, and Conformance). Like DKIM, both SPF and DMARC are implemented by adding records to your domain's DNS.

sendlayer.com logo
SendLayer - Reliable Email Deliverability Made Easy says:
Visit website
SPF, DKIM, DMARC are email authentication protocols you must set to ensure your emails are marked as genuine.

SPF specifies which mail servers are permitted to send email on behalf of your domain. DMARC then ties SPF and DKIM together, creating a policy that tells receivers what to do if an email fails these checks. All three rely on publishing TXT records in your DNS, making correct DNS configuration paramount for email deliverability and security.

So, to sum up, you do not need to configure a specific port for DKIM verification. Instead, focus your efforts on correctly generating your public/private key pair and accurately publishing the public key in your domain's DNS records. That is where the magic of DKIM happens.

Start improving your email deliverability today

Get started