The short answer is: the d= tag. This tag is a mandatory component of a DKIM signature and explicitly states the domain that is taking responsibility for the message.
When a receiving mail server processes an incoming email, it looks for the DKIM-Signature header. Within this header, it finds the d= tag to identify the Signing Domain Identifier (SDID). This tells the server which domain's DNS it needs to query to retrieve the public key required for verification. Without this tag, the entire DKIM authentication process would fail, as the verifier wouldn't know where to look for the key.
The d= tag doesn't work alone. It's part of a collection of tags within the DKIM signature that provide instructions to the receiving server. As DMARC Director explains, these tags specify all the details needed for verification. Some of the most crucial tags that work alongside d= include:
The d= tag is especially critical for DMARC (Domain-based Message Authentication, Reporting, and Conformance). DMARC checks to see if the domain in the d= tag aligns with the domain in the 'From' header, the one the recipient sees.
If they don't match, DMARC will fail the DKIM check, even if the signature itself is technically valid. This alignment is a key security feature that prevents spoofing, where a malicious actor might use a valid DKIM signature from their own domain on an email pretending to be from your domain. Correctly configuring the domain in your DKIM setup ensures that your legitimate emails pass DMARC, protecting your domain against spoofing and improving your overall deliverability.
In summary, while a DKIM signature contains many parts, the d= tag is the anchor. It directly names the domain signing the email, enabling the entire verification process and forming the foundation for DMARC alignment.