SHA1 DKIM keys are no longer considered secure and are officially deprecated due to known cryptographic vulnerabilities, including susceptibility to collision attacks. While some older or less security-conscious systems may still technically accept SHA1 signatures, relying on them presents a significant risk to email deliverability. Modern email providers and industry standards strongly recommend, and in some cases, effectively require, the use of SHA256 for DKIM. Continuing to use SHA1 can lead to emails being rejected, deprioritized, or treated as untrusted, thereby negatively impacting inbox placement. Therefore, an immediate transition to SHA256 is crucial for maintaining robust email authentication and ensuring successful email delivery.
10 marketer opinions
Relying on SHA1 for DKIM signatures presents a significant and growing risk to email deliverability. This cryptographic algorithm is now widely considered insecure due to demonstrated vulnerabilities, including collision attacks, and has been officially deprecated by industry standards. While some email providers may still technically process SHA1-signed emails, the increasing stringency of security checks means these messages are highly likely to be rejected, quarantined, or deprioritized, essentially equating to a failed authentication. The consensus among deliverability experts and formal RFCs is clear: immediate migration to SHA256 is essential. Continuing to use SHA1 is akin to having no authentication at all, as mail servers actively look for reasons to distrust traffic, ultimately leading to severe negative impacts on inbox placement.
Marketer view
Marketer from Email Geeks explains that if a DKIM key is not trusted due to insecurity, it will likely be an issue for deliverability, especially with providers like Gmail having a no-tolerance policy for security. SHA1 is insecure because it is computationally too easy to crack and has been vulnerable to collision attacks for a while. She recommends ensuring all the latest security measures are enabled to avoid filters rejecting or deprioritizing traffic. She notes that using a vulnerable algorithm for DKIM is close to not having one, as mail servers look for any reason to reject traffic. She advises fixing it immediately, though acknowledging that immediate deliverability changes might take a couple of weeks to become apparent in data.
28 Jun 2022 - Email Geeks
Marketer view
Marketer from Email Geeks confirms that SHA1 DKIM keys are deprecated in RFC8301 and should be replaced. He cites the RFC, stating, "DKIM signatures identified as having been signed with historic algorithms (currently, rsa-sha1) have permanently failed evaluation," confirming the critical need for an upgrade.
30 Nov 2024 - Email Geeks
3 expert opinions
SHA1 DKIM keys are widely seen as insecure and have been officially deprecated by industry experts due to known cryptographic vulnerabilities. While a SHA1 key might still technically pass validation with some receiving servers, its inherent insecurity means it is often perceived as untrustworthy. This lack of trust can directly and significantly impact email deliverability, potentially leading to emails being rejected, quarantined, or routed to the spam folder. The strong recommendation across the deliverability community is to immediately transition from SHA1 to SHA256 to ensure robust email authentication, maintain sender reputation, and secure reliable inbox placement in the evolving email ecosystem.
Expert view
Expert from Email Geeks advises against using old, insecure SHA1 DKIM key types as they can affect deliverability. While a SHA1 key might still pass DKIM validation, it does not mean it will be trusted by receiving servers. If treated as an untrusted key, it may be perceived as not being DKIM signed at all, potentially impacting inbox placement. Based on new information regarding RFC deprecation, she fully endorses fixing it immediately.
10 Aug 2024 - Email Geeks
Expert view
Expert from Spam Resource explains that while SHA1 for DKIM was previously accepted, it is no longer considered secure for digital signatures and makes emails vulnerable to forgery. Although major providers like Gmail accepted it, the industry's move away from SHA1 suggests that mail providers may eventually stop accepting it, which could impact future deliverability.
1 Sep 2023 - Spam Resource
5 technical articles
SHA1 DKIM keys are no longer considered cryptographically sound and have been officially deprecated, carrying significant implications for email deliverability. While a small number of legacy systems might still process them, the overwhelming consensus among industry bodies and major email providers is that SHA1 is insecure due to known vulnerabilities. Relying on this outdated algorithm means that emails signed with SHA1 are increasingly likely to be distrusted, rejected, or routed to spam folders by recipient mail servers. Therefore, an immediate and thorough migration to SHA256 is vital to maintain robust email authentication and secure reliable inbox placement.
Technical article
Documentation from IETF (RFC 8461) states that SHA1 is considered cryptographically broken and is deprecated for use in DKIM signing. While it notes that some older or less security-conscious verifiers might still accept it, senders should transition to SHA256 or stronger algorithms for new deployments to maintain security and avoid potential issues with future verification policies.
29 Apr 2022 - IETF
Technical article
Documentation from Postmark indicates that their DKIM records use SHA256, signaling that modern email service providers have adopted the stronger hash algorithm. This practice helps ensure the cryptographic integrity of signed emails, which is crucial for successful deliverability and avoiding potential issues with receiving servers that may distrust SHA1.
6 Sep 2023 - Postmark
Does rotating DKIM keys improve email deliverability and how should DKIM keys be rotated?
How does individual DKIM versus shared DKIM affect email deliverability?
How does turning on DKIM impact domain reputation and email deliverability?
How to configure DomainKeys DKIM for email authentication and is it still relevant?
Why is DKIM key rotation recommended, and what key length is secure?
Will 2048-bit DKIM keys or stricter DMARC policies become new email authentication requirements?