Email providers are becoming increasingly strict regarding the strength and type of DKIM keys used for email authentication. They handle 'weak' DKIM keys, typically those under 1024 bits, with suspicion, often leading to increased spam scoring, deliverability issues, or outright rejection of messages. Conversely, 'exotic' DKIM keys, referring to non-RSA algorithms or non-standard exponents, are generally not supported or recognized by current email standards and receiving mail servers, almost certainly resulting in authentication failures. Best practices and provider requirements consistently point towards using robust 1024-bit or, preferably, 2048-bit RSA keys to ensure optimal email deliverability and maintain a strong sender reputation.
12 marketer opinions
Email providers, using increasingly sophisticated scoring systems, treat DKIM keys under 1024 bits (often called 'weak' keys) with suspicion, even if they are technically valid. This frequently results in increased spam scoring, deliverability challenges, or outright message rejection. Similarly, 'exotic' DKIM keys, such as those employing non-RSA algorithms (e.g., ed25519) or non-standard exponents, are largely unsupported or unrecognized by receiving mail servers, leading to authentication failures. These practices collectively signal poor security or misconfiguration, negatively affecting a sender's reputation and their ability to reach the inbox.
Marketer view
Marketer from Email Geeks explains they are conducting a project with their CEO to study how different email providers handle exotic and weak DKIM keys and is requesting assistance from others to send test emails to non-listed providers and return Authentication-Results headers.
27 Feb 2025 - Email Geeks
Marketer view
Marketer from Email Geeks responds by offering to assist with the DKIM key testing project via direct message.
6 Jul 2025 - Email Geeks
2 expert opinions
Email providers are now strictly enforcing higher standards for DKIM key strength, with prominent services like Yahoo and Verizon Media explicitly requiring 2048-bit DKIM keys for all outgoing mail. This policy shift means that emails signed with weaker 1024-bit keys may be rejected outright or encounter deliverability obstacles. These measures underscore a commitment to robust authentication, minimizing the chance of email abuse and fostering a more secure email environment.
Expert view
Expert from Word to the Wise shares that email providers are becoming increasingly strict about authentication standards. For instance, Yahoo and Verizon Media have publicly stated that they require senders to use 2048-bit DKIM keys for all outbound mail. This indicates that weaker 1024-bit keys may be rejected or result in deliverability issues, effectively addressing how providers handle less secure DKIM implementations.
9 Jan 2023 - Word to the Wise
Expert view
Expert from Spam Resource explains that major email providers, such as Yahoo, have long enforced stricter requirements for DKIM key sizes. Specifically, mail signed with a weaker 1024-bit DKIM key was rejected, while a 2048-bit key was required. This policy demonstrates that providers handle weak or less secure DKIM keys by simply not accepting mail signed with them, thereby promoting stronger authentication standards.
15 Aug 2022 - Spam Resource
7 technical articles
Building on the evolving landscape of email security, providers are rigorously assessing incoming messages based on both the cryptographic strength and specific type of DKIM keys used. Keys deemed 'weak,' typically falling below the recommended 1024-bit length, are met with increased skepticism, often leading to reduced inbox placement or even outright rejection. Similarly, 'exotic' DKIM key types—those employing non-RSA algorithms or non-standard exponents—are largely incompatible with the established DKIM standard, resulting in authentication failures. This stringent evaluation reflects a broader effort to enhance email security and combat potential abuse.
Technical article
Documentation from M3AAWG's Sender Best Current Practices states that DKIM keys should be a minimum of 1024 bits for adequate security, with 2048 bits recommended for higher security. This implies that email providers, adhering to industry best practices, will consider shorter keys weak and may treat emails signed with them less favorably, impacting deliverability.
6 Dec 2024 - M3AAWG Sender Best Current Practices
Technical article
Documentation from Microsoft Learn states that Microsoft 365 supports DKIM with 1024-bit and 2048-bit RSA keys. This indicates that email providers like Microsoft may not correctly process or may disregard DKIM signatures using shorter or unsupported key lengths.
22 Dec 2022 - Microsoft Learn
Are people using 4096-bit DKIM keys, and what is the recommended DKIM key length?
Does rotating DKIM keys improve email deliverability and how should DKIM keys be rotated?
How does XS4ALL handle DMARC enforcement and DKIM signatures?
Why defend DKIM key size and what key sizes do ESP's support?
Why is DKIM failing at some ISPs but not others, and how can I fix it?
Will 2048-bit DKIM keys or stricter DMARC policies become new email authentication requirements?