Suped

Is the DKIM 'v' tag always 'DKIM1'?

Matthew Whittaker profile picture
Matthew Whittaker
Co-founder & CTO, Suped
Published 17 Feb 2025
Updated 26 Oct 2025
7 min read
Stylized DKIM 'v' tag with 'DKIM1' showing email authentication
When you delve into the world of email authentication, you quickly encounter various DNS records and their respective tags. One such critical component is DKIM (DomainKeys Identified Mail), which uses a set of tags within its DNS TXT record to convey important information. A common question I hear is about the 'v' tag: is it always set to DKIM1? The short answer is yes, for all practical purposes, the DKIM 'v' tag should always be set to v=DKIM1;.
This tag specifies the version of the DKIM protocol being used. While the possibility of future versions exists, currently, DKIM1 is the universally accepted and implemented version. Understanding this seemingly small detail is crucial for ensuring your email authentication is correctly configured, leading to better email deliverability and protecting your domain from impersonation.

The purpose of the 'v' tag

The 'v' tag stands for 'version' and is a mandatory part of any DKIM DNS TXT record. Its purpose is to clearly state which version of the DKIM specification the record adheres to. This allows email receivers to interpret the record correctly. As the email security landscape evolves, protocols are updated, and version tags like this are essential for maintaining compatibility and enabling future enhancements.
At present, DKIM1 is the only defined and widely adopted version of DKIM. This means that if you're setting up a DKIM record, you must include v=DKIM1; at the beginning of your TXT record. Failing to do so can lead to authentication failures, impacting your email deliverability. Some mail servers might infer DKIM1 if the tag is missing, but it is not a guarantee for all compliant implementations, making its explicit inclusion a best practice.
The consistent use of v=DKIM1; ensures that all receiving mail servers correctly interpret your DKIM record. This is a fundamental step in building a robust email authentication posture. For more technical details on why the v tag is crucial, you can refer to discussions on ServerFault regarding omitting the tag.

Important for compliance

Always include v=DKIM1; at the start of your DKIM DNS TXT record. While some systems may be forgiving if it's omitted, relying on default behavior can lead to inconsistent authentication results and potential email delivery issues.

Anatomy of a DKIM record

Beyond the 'v' tag, a DKIM record comprises several other tags, each serving a specific function in the authentication process. Understanding these tags is key to proper configuration. For instance, the s= tag specifies the selector name for DKIM, which points to the specific public key used for signing. The p= tag contains the domain's public key, which receivers use to verify the email's signature.
Another important tag is a=, which indicates the algorithm used for signing, typically rsa-sha256. The d= tag explicitly identifies the signing domain. All these tags collectively form a robust system for verifying email authenticity. You can find more details about DKIM syntax and its tags on DuoCircle's article.
Example DKIM DNS TXT recorddns
selector1._domainkey.example.com. IN TXT "v=DKIM1; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDy8i..."
This record is published in your domain's DNS. When an email is sent, the sending server generates a digital signature for the email and includes it in the email headers. The receiving server then queries the sender's DNS for the DKIM record, retrieves the public key, and uses it to verify the signature. This process confirms that the email has not been tampered with in transit and truly originates from the claimed domain. You can explore a simple guide to DMARC, SPF, and DKIM for more context.

Mandatory DKIM tags

  1. Version: The v=DKIM1; tag, indicating the DKIM version. Essential for all records.
  2. Public key data: The p= tag, which holds the cryptographic public key.

Optional DKIM tags

  1. Service type: The t= tag, indicating the service type, e.g., email. This is rarely used.
  2. Granularity: The g= tag, for specifying email address granularity. Defaults to no restrictions.

Why 'v=DKIM1' is crucial for email deliverability

Correctly configuring your DKIM record, including the v=DKIM1; tag, is paramount for email deliverability. DKIM, along with SPF and DMARC, forms a powerful trifecta of email authentication protocols that help prove the legitimacy of your emails. Without proper authentication, your emails are more likely to be flagged as spam or outright rejected by receiving mail servers, negatively impacting your communication and reputation.
Secure email authentication with DKIM
Implementing DKIM helps email providers like google.com logoGoogle and microsoft.com logoMicrosoft trust your domain, leading to better inbox placement. When receivers can verify that an email's content hasn't been altered and it truly came from your domain, your sender reputation improves. This is particularly vital for organizations that send a high volume of transactional or marketing emails, as even minor authentication failures can significantly affect campaign performance and customer trust. To further enhance this trust, consider setting up DMARC monitoring.

Common issues with DKIM records

While the 'v' tag itself is straightforward, other aspects of DKIM can lead to configuration issues. Common problems include incorrect public keys, incorrect selectors, or issues with your DKIM body hash mismatch. These issues often go unnoticed until you start seeing emails land in spam folders or hear complaints from recipients.
DMARC reports are invaluable for identifying and diagnosing DKIM failures. These reports provide insights into how your emails are authenticating across the internet, allowing you to pinpoint the exact cause of any issues. For example, if you see a high percentage of DKIM failures, it might indicate a misconfigured record, a compromised key, or issues with your email service provider. Having a clear understanding of your list of DMARC tags and their meanings will further aid your understanding of authentication data.
Tools like Suped simplify this process by aggregating DMARC reports and offering actionable insights. Our platform provides AI-powered recommendations to help you fix configuration errors and strengthen your policy. With real-time alerts and a unified platform that monitors DMARC, SPF, and DKIM, we make it easy to manage your email security. We also offer SPF flattening and a multi-tenancy dashboard, ideal for MSPs and businesses managing multiple domains. This ensures you can proactively address problems like DKIM record not found or DKIM temperror efficiently.

Issue

Symptom

Potential fix

Missing 'v=DKIM1;' tag
DKIM authentication fails or is inconsistent, particularly on strict mail servers.
Ensure your DKIM TXT record begins with v=DKIM1;.
Incorrect public key
DKIM signature verification fails due to mismatch between public and private keys.
Verify the p= tag content with your email service provider or key generator.
Wrong selector
Receiving servers cannot find the correct public key to verify the signature.
Ensure the s= tag in your DNS matches the selector in your email headers.

Ensuring DKIM compliance and future-proofing your email

The 'v' tag in DKIM records, specifically v=DKIM1;, is a small but critical component of email authentication. Its consistent presence ensures that your DKIM records are correctly interpreted, contributing significantly to your email's legitimacy and deliverability. While there's only one version in use today, acknowledging its importance is fundamental for maintaining a strong email security posture.
Proper DKIM configuration is not just about compliance, it's about safeguarding your brand, ensuring your messages reach their intended recipients, and protecting against phishing and spoofing attacks. By paying attention to details like the 'v' tag and continually monitoring your authentication results, you can ensure your email infrastructure remains robust and trusted.
Leveraging platforms like Suped gives you the clarity and control you need over your email authentication. Our free DMARC monitoring plan offers essential insights, helping you to proactively manage and optimize your email deliverability, ensuring that every 'v=DKIM1;' is doing its job effectively.

Frequently asked questions

DMARC monitoring

Start monitoring your DMARC reports today

Suped DMARC platform dashboard

What you'll get with Suped

Real-time DMARC report monitoring and analysis
Automated alerts for authentication failures
Clear recommendations to improve email deliverability
Protection against phishing and domain spoofing