Using the same DKIM domain and selector for multiple email campaigns is generally not problematic if all campaigns are sent through the exact same email sending system. However, if different email service providers or sending systems are used for the same domain, it is critical and necessary to employ unique DKIM selectors for each. The 'd=' tag defines the domain and impacts reputation sharing, while the 's=' selector points to a specific public key. Attempting to use the same selector with different private keys from multiple uncoordinated senders will cause DKIM validation to fail.
DKIM validation tools may sometimes display errors even for valid records due to several common reasons. These include the time it takes for DNS changes to propagate globally, local DNS caching issues, subtle typos or formatting errors, such as extra spaces or missing characters, in the DKIM TXT record. Furthermore, a mismatch between the selector used to sign the email and the one published in DNS will always result in a validation failure. Some tools might also have strict validation rules or temporary limitations that can lead to false negatives.
12 marketer opinions
Using the same DKIM domain ('d=' tag) across multiple email campaigns is beneficial as it allows them to share reputation. However, the core issue with using the same DKIM selector ('s=' tag) for multiple campaigns depends on whether different sending systems, each with their own unique private key, are involved. If different email service providers are sending for the same domain, each must use a unique DKIM selector. Attempting to use the same selector with different private keys across uncoordinated senders will inevitably lead to authentication failures because the retrieved public key will not match the signature.
Even seemingly valid DKIM records can sometimes trigger errors in validation tools for several reasons. These include the time required for DNS changes to propagate globally, local DNS caching issues, and precise formatting errors within the DKIM TXT record, such as extra spaces or missing characters. Furthermore, a mismatch between the selector specified in the email's header and the one published in DNS is a common cause of failure. It's also worth noting that some validation tools may have specific limitations or exhibit temporary false negatives due to network conditions.
Marketer view
Email marketer from Email Geeks explains that DKIM reputation is keyed on the 'd=' tag, and the selector is an implementation feature. He advises that using the same 'd=' allows campaigns to share reputation. He also notes that while the DKIM specification requires base64 encoding, many tools will silently discard spaces in parameters, and some checking tools may incorrectly reject valid DKIM configurations.
28 Jun 2021 - Email Geeks
Marketer view
Email marketer from Email Geeks shares that a missing version tag (like 'v=DKIM1') in a DKIM record is not typically a problem and suggests using a tool like protodave.com/tools/dkim-key-checker/ for validation.
25 Dec 2024 - Email Geeks
2 expert opinions
While leveraging a consistent DKIM domain across various email campaigns is generally advisable for shared reputation, issues arise when the same DKIM selector is employed across multiple, distinct sending platforms. Each unique email sending system, whether an in-house server or a third-party provider, ideally requires its own DKIM selector. This setup enables independent key management and rotation, significantly mitigating the risk that a compromise or misconfiguration of one key could impact all your sending operations. Furthermore, DKIM validation tools, despite displaying errors for seemingly correct records, often point to underlying technical issues. Common culprits include subtle errors in the DNS TXT record itself, a crucial mismatch between the private key used by the mail server to sign the email and the public key published in DNS, or even instances where the sending server failed to apply the signature correctly. Additionally, any modification or forwarding of an email after its initial signing can invalidate the DKIM signature, leading to validation failures.
Expert view
Expert from Word to the Wise explains that it is generally not problematic to use the same DKIM domain and selector for multiple email campaigns if they are sent via the same email sending system. However, it is beneficial, and often necessary, to use different DKIM selectors if you employ multiple sending providers or systems for your campaigns, even for the same domain. This allows for the setup and management of distinct DKIM keys, enabling independent key rotation and reducing the risk that a compromise or issue with one key affects all other campaigns.
20 Jul 2024 - Word to the Wise
Expert view
Expert from Word to the Wise explains that DKIM validation tools may sometimes show errors for seemingly valid records due to several common issues. These include an incorrect or missing DNS TXT record, such as typos, extra characters, or missing elements in the published public key; a mismatch between the signing key used by the mail server and the public key published in DNS, often due to key rotation without updating DNS; the mail server failing to sign the email correctly; or the email being modified or forwarded in transit, which can invalidate the DKIM signature.
23 Apr 2025 - Word to the Wise
4 technical articles
While a unified DKIM domain across various campaigns is beneficial for shared reputation, using the identical DKIM selector for emails originating from different sending systems presents significant problems. Each distinct email service provider or system that sends on behalf of your domain should use its own unique DKIM selector. This ensures that the correct public key is retrieved for validation, as a shared selector with different underlying private keys will lead to authentication failures. The selector essentially acts as a specific pointer to a public key within your DNS, allowing a domain to manage multiple keys for various purposes, including key rotation or distinguishing different signing entities. When validation tools report errors for DKIM records, common culprits include DNS propagation delays, local caching, subtle formatting mistakes within the TXT record, or a crucial mismatch between the selector specified in the email header and the one published in DNS.
Technical article
Documentation from Google Workspace Admin Help explains that if you send email from multiple systems for the same domain, each system might require its own DKIM key and selector. If you configure the same selector with different keys on different systems, it will cause validation failures. It is crucial for each system to have its unique selector and corresponding key.
20 Sep 2022 - Google Workspace Admin Help
Technical article
Documentation from Microsoft Learn explains that DKIM uses a 'selector' to point to the correct public key for message validation. For key rotation, new keys are published using different selectors. It's possible to have multiple active DKIM selectors for a single domain, which is useful when migrating keys or when different services sign emails for the same domain. Using the same selector for different keys from different services would lead to validation errors.
3 Nov 2023 - Microsoft Learn
Do DKIM selectors affect email reputation?
How does changing DKIM selectors impact email reputation and what are the best practices for key rotation?
Is DKIM signature case-sensitive and what causes DKIM tester errors?
What are the considerations for using different domains for From, DKIM, and SPF?
What causes DKIM errors during double DKIM implementation and how can they be fixed?
Why does Aboutmy.email show no DKIM signature but other tools validate DKIM? How do SPF alignment and DMARC work?