Mailjet users seeking to enhance their email security often inquire about upgrading their DKIM signing key from the standard 1024-bit to a more robust 2048-bit key. While 2048-bit keys offer increased cryptographic strength, their implementation may present challenges related to DNS record management due to increased length. Direct user-initiated changes for DKIM key length in platforms like Mailjet are not typically available, often requiring interaction with their support team. This approach ensures proper configuration and avoids deliverability issues.
Key findings
Support assistance: Mailjet typically requires users to contact their support team to facilitate the change to a 2048-bit DKIM key, as direct self-service options may not be available. Mailjet addresses 1024-bit versus 2048-bit keys.
Increased security: A 2048-bit DKIM key offers a higher level of cryptographic security compared to a 1024-bit key, making it more resistant to brute-force attacks and enhancing email authenticity. You can read about the pros and cons of different DKIM key sizes.
DNS complexity: Managing longer 2048-bit public keys in DNS can be more complex due to potential character limits in TXT records, often requiring the record to be split into multiple strings.
DNS tool evolution: Modern DNS management tools are generally equipped to handle 2048-bit keys, despite previous limitations where web interfaces lagged in supporting the longer record sizes.
DNS provider support: Before attempting to set up a 2048-bit DKIM key, ensure your specific DNS provider supports longer TXT records or the necessary splitting method.
Testing is crucial: When implementing a new DKIM key, particularly with a larger size, thorough testing on internal domains or a pilot basis is recommended before rolling it out to production or client domains.
DNS record splitting: Be prepared to split the DKIM TXT record into two or more parts if your DNS provider has character limits for individual strings, ensuring proper concatenation for the public key. For example, AWS knowledge center describes resolving string too long errors.
Coordination with ESP: Maintain clear communication with your Email Service Provider's (ESP) support team throughout the process to ensure their systems are configured to sign emails with the new 2048-bit key.
Impact on deliverability: Incorrectly configured DKIM records can lead to deliverability issues, including emails landing in spam folders or being rejected. Always verify proper setup.
Email marketers are often keen to adopt stronger security measures like 2048-bit DKIM keys but face practical hurdles regarding implementation with their ESPs and DNS providers. Their discussions frequently highlight the balance between enhanced security and the technical effort required, especially when dealing with client accounts or less tech-savvy teams. The general consensus points to the necessity of ESP support for key upgrades and careful DNS management to avoid disruption.
Key opinions
ESP dependency: Many marketers believe that upgrading to a 2048-bit DKIM key is largely dependent on the ESP's (Mailjet, in this case) willingness and capability to provide this option through their support channels.
DNS challenge: The primary concern for marketers is not the theoretical benefit of a 2048-bit key but the practical difficulty of configuring it within various DNS management interfaces, especially for those less familiar with such technicalities.
Security priority: There's a strong desire among marketers to enhance email security (via DKIM key length) to bolster trust and improve deliverability, even if it means navigating technical complexities.
Gradual rollout: It is preferred to test any changes to DKIM keys internally or on controlled domains before wider deployment to client accounts to prevent unforeseen issues.
Authentication basics: Understanding DMARC, SPF, and DKIM is crucial for effective email marketing.
Key considerations
Client management: For agencies or marketers managing multiple client accounts, the process of implementing 2048-bit DKIM keys can be especially challenging if clients lack technical expertise or direct DNS control.
Avoiding disruption: The primary goal is to enhance security without inadvertently causing deliverability issues. This requires careful planning and execution.
DNS interface limitations: Some older or less sophisticated DNS interfaces might not handle the longer 2048-bit DKIM TXT records gracefully, necessitating manual splitting or workarounds.
Email marketer from Email Geeks asked about whether Mailjet supports 2048-bit DKIM keys. They are trying to enhance security without risking deliverability issues. This highlights the common user dilemma between security and stability.
09 Nov 2020 - Email Geeks
Marketer view
Email marketer from Email Geeks mentioned their plan to test 2048-bit DKIM on their own domains first. They also plan to roll it out only to customers where they have direct control over the DNS settings. This cautious approach is common among those managing multiple domains.
09 Nov 2020 - Email Geeks
What the experts say
Experts in email deliverability and security uniformly recommend adopting 2048-bit DKIM keys for enhanced cryptographic strength. While acknowledging the historical challenges with DNS record management, they point out that most modern DNS tools now support larger key sizes, often by automatically handling the splitting of TXT records. The consensus emphasizes that ESPs should facilitate this upgrade, as it significantly contributes to a domain's overall email security posture and helps maintain domain reputation.
Key opinions
ESP role: Experts confirm that ESPs like Mailjet are typically responsible for generating and allowing the implementation of 2048-bit DKIM keys through their support channels, rather than direct user control. ESPs often defend their key size decisions.
DNS handling: Modern DNS management tools have largely caught up to the demand for 2048-bit keys, often managing the splitting of larger TXT records automatically, which was a significant pain point previously.
Security best practice: 2048-bit keys are considered a superior security practice and are increasingly becoming the recommended standard for strong email authentication.
Preventing issues: Even with advanced DNS tools, careful verification of the DKIM record after creation is essential to prevent validation failures or errors like DKIM temperror.
DNS record size: While 2048-bit keys are larger, most DNS providers can handle them, either directly or by automatically concatenating split strings. It is recommended to follow best practices for 2048-bit DKIM keys.
Ongoing monitoring: After implementing a 2048-bit DKIM key, continuous monitoring of email deliverability and DMARC reports is vital to ensure proper functionality and address any unforeseen issues.
Legacy systems: While most systems are updated, some older mail servers or DNS resolvers might occasionally encounter issues with longer DKIM records, which is a rare but possible scenario.
Expert view
Expert from Email Geeks confirms that Mailjet support can assist in setting up a 2048-bit DKIM key. They clarified that direct user control over this setting is not available, indicating it's an internal process for the ESP.
09 Nov 2020 - Email Geeks
Expert view
Expert from Email Geeks states that 2048-bit keys are now widely supported by DNS management tools. They explained the historical issue was the need to split the DNS record, and that older web interfaces were slow to adapt, but this is less of an issue now.
09 Nov 2020 - Email Geeks
What the documentation says
Official documentation and technical standards generally support the use of 2048-bit DKIM keys for enhanced security, recognizing them as an improvement over 1024-bit keys. They provide guidelines for handling the increased length of DKIM TXT records, often recommending string concatenation (splitting the record into multiple quoted strings within a single TXT record) when DNS provider limits are encountered. The documentation consistently emphasizes accurate configuration to ensure proper email authentication and avoid DMARC failures.
Key findings
Standard recommendation: Many security best practices documents recommend 2048-bit keys over 1024-bit for stronger cryptographic protection against evolving threats.
TXT record limitations: DNS specifications allow TXT records to be long, but individual string literals within them often have character limits (e.g., 255 characters). 2048-bit DKIM keys usually exceed this, necessitating splitting.
Splitting mechanism: To accommodate longer keys, the public key value should be enclosed in multiple sets of double quotation marks within a single TXT record. DNS resolvers will then concatenate these strings. Failure to do so can cause invalid RSA public key errors.
No demand issue: Historically, DNS interfaces were slow to support 2048-bit keys because there wasn't a widespread demand for them. This has changed, leading to better support now.
Key considerations
Format precision: When splitting, ensure there's no space between the closing quote of one string and the opening quote of the next, unless explicitly intended for concatenation. A single space between quoted strings is standard for concatenation in DNS.
Provider-specific instructions: Always refer to your DNS provider's specific documentation for how they handle long TXT records. Some providers may have unique interface requirements or automated splitting features.
Key generation: The ESP will generate the 2048-bit key. You can find out how to generate a DKIM key if needed for other contexts.
Impact on DNS lookup limits: While DKIM records themselves don't typically impact the 10-lookup SPF limit, ensuring the TXT record for DKIM is correctly formed prevents unnecessary DNS queries or validation failures.
Technical article
RFC 6376, which defines DKIM, specifies that the DKIM-Signature header should not be subject to line wrapping. This implies that the entire signature, including the key, should be treated as a single string during transmission, even if the DNS record is split.
07 Sep 2011 - RFC 6376
Technical article
The AWS Route 53 documentation describes how to resolve the "CharacterStringTooLong" error for DNS TXT records. It explicitly instructs users to split the long string into multiple parts and enclose each part in double quotation marks, separated by a single blank space.