Suped

Summary

DKIM (DomainKeys Identified Mail) is a crucial email authentication method that uses cryptographic signatures to verify the sender's identity and ensure message integrity. A common issue arises when DNS providers impose character limits on TXT records, which are used to publish DKIM public keys. While the DNS protocol itself allows for longer TXT records by concatenating multiple strings within a single record, many older or less sophisticated DNS management interfaces (such as those that are CGI or ASPX based) fail to properly support this, leading to truncated or invalid DKIM keys. This can result in authentication failures and impact email deliverability.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers and technical managers frequently encounter challenges with DKIM key length limits imposed by DNS providers. These limitations often stem from outdated or restrictive DNS management interfaces rather than fundamental DNS protocol constraints. The consensus among marketers is that such issues are frustrating and necessitate workarounds or, ideally, a migration to a more capable DNS service. Understanding the true nature of TXT record concatenation is crucial to overcoming these hurdles.

Marketer view

Marketer from Email Geeks suggests that their customer faced a DKIM barrier where their domain portal trimmed the key to 133 characters, despite the value being 228 characters and expecting space for 255. This limitation prevented the full DKIM key from being entered, causing authentication issues.

25 May 2021 - Email Geeks

Marketer view

Marketer from Email Geeks notes that their DNS provider's support (BT) advised splitting the DKIM key into duplicate TXT entries using their portal. However, this approach resulted in incorrect dig outputs and confusion for dkimcore, indicating that duplicate entries lead to invalid DKIM keys.

25 May 2021 - Email Geeks

What the experts say

Industry experts concur that DNS provider limitations on TXT record length are a common, yet solvable, issue for DKIM key implementation. These limitations are typically due to inadequate web interfaces rather than inherent DNS protocol restrictions. Experts emphasize the importance of understanding how DNS concatenates strings within a single TXT record and advise migrating to more capable DNS services when faced with such constraints. They also highlight the need to correctly diagnose bounce messages, differentiating between DNS configuration issues and other potential problems like Exchange server misconfigurations.

Expert view

Expert from Email Geeks indicates that they frequently encounter DNS providers who are not truly competent DNS specialists, leading them to provide inaccurate or misleading information about DNS configurations. This highlights a common challenge in email deliverability.

25 May 2021 - Email Geeks

Expert view

Expert from Email Geeks clarifies that using duplicate TXT entries for a single DKIM key will inevitably lead to an invalid DKIM key and, consequently, no valid DKIM signatures on outbound emails. This is a critical point for proper authentication.

25 May 2021 - Email Geeks

What the documentation says

Official documentation and technical guides consistently confirm that the DNS protocol allows for long TXT records by breaking them into multiple strings within a single record, which are then concatenated by the resolver. The common problem of character limits is typically an arbitrary restriction imposed by DNS management interfaces, not a fundamental protocol limitation. Therefore, overcoming these issues requires either a compliant DNS provider or careful manual splitting and concatenation of the DKIM key string.

Technical article

Documentation from Server Fault explains that the 255-character limit per string on TXT records is not a limitation imposed by specific DNS providers like Route 53, but rather a fundamental constraint of the DNS protocol itself. This means that any long TXT record must be split into multiple string literals.

15 Mar 2016 - Server Fault

Technical article

Documentation from AWS Knowledge Center advises that DNS DKIM TXT records can contain up to 255 characters in a single string. To resolve the 'CharacterStringTooLong' error, it is necessary to split TXT record strings that exceed 255 characters into multiple text strings within the same record.

10 Apr 2023 - Amazon Web Services, Inc.

13 resources

Start improving your email deliverability today

Get started