Suped

Summary

DKIM (DomainKeys Identified Mail) is a critical email authentication standard that allows a recipient to verify that an email was indeed sent and authorized by the owner of that domain. When your DKIM records aren't validating, it can lead to significant deliverability issues, even if the records appear to be correctly published. This often stems from subtle DNS configuration problems, interactions with hosting providers, or misunderstandings about how multiple DKIM keys for the same service are handled. Troubleshooting these issues requires a systematic approach to identify the root cause, which is frequently a discrepancy between where DNS records are managed and where they are being checked.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers often face challenges with DKIM validation, particularly when dealing with complex hosting environments or multiple email sending platforms. The common refrain is that the records look correct in their DNS provider's interface, but validation tools or DMARC reports show failures. This highlights a gap in understanding between how DNS changes are made and how they actually propagate and resolve on the internet. Frustration often mounts when basic checks seem to pass, yet deeper issues persist. Many marketers share anecdotes of time-consuming trials and errors, especially with providers that have unique DNS handling quirks.

Marketer view

Email marketer from Email Geeks shared a situation where their client's Shopify store had two sets of DKIM records for Amazon SES: one from their service and another from a different provider, Flodesk. Despite the records being distinct and appearing accurate, their DKIM validation consistently failed. This scenario raised questions about potential conflicts when multiple entities attempt to configure DKIM for the same underlying email sending service, even with different selectors.

02 Oct 2024 - Email Geeks

Marketer view

An email marketer from a marketing forum explained that they frequently encounter issues where clients assume their DNS is managed by their e-commerce platform (like Shopify), but the platform's DNS setup actually points to a third-party like Google Domains or Squarespace. This creates a disconnect, as changes made in the e-commerce platform's interface do not propagate to the live DNS, leading to DKIM records not validating.

15 Sep 2024 - MarketingProfs

What the experts say

Email deliverability experts consistently point to DNS configuration as the primary culprit when DKIM records fail to validate despite seeming accurate. The consensus is that if a DKIM public key isn't resolving, it's almost always an issue with how the DNS records are published or where the domain's name servers are actually pointing. Experts emphasize the importance of understanding the authoritative DNS server for a domain, as well as the specific requirements of the DNS provider for CNAME or TXT record entry, including how they handle domain appending. Misinterpretations of 'selector' versus 'name' fields are also common pitfalls.

Expert view

Email expert from Email Geeks, Todd Herr, queried the DNS for the provided DKIM records and found that the hostnames, like flodesk._domainkey.egoswim.com, were not found (NXDOMAIN). This immediately indicated that the DKIM public keys did not exist in DNS at all, which is a definitive reason for DKIM failures. He pointed out that while the records might be entered in some UI, they weren't publicly resolvable.

02 Oct 2024 - Email Geeks

Expert view

Email expert from Word to the Wise, Laura, suggests that if you can't determine the exact selector and domain (the 's=' and 'd=' values) being used in the DKIM signature, it becomes impossible to properly look up the public key in DNS. She emphasized that knowing these specific values is critical for troubleshooting why a DKIM key isn't publishing correctly. This precise information allows for direct DNS queries to confirm existence.

01 Oct 2024 - Word to the Wise

What the documentation says

Official DKIM documentation and related RFCs (Request for Comments) define the precise structure and lookup mechanism for DKIM records. The core principle is that a recipient Mail Transfer Agent (MTA) constructs a query using the 's=' (selector) and 'd=' (signing domain) values from the email's DKIM-Signature header. This query is sent to the DNS to retrieve a public key, typically stored in a TXT record. Any deviation from the specified format, incorrect host, or failure of the record to resolve publicly will result in a DKIM validation failure. Documentation also often specifies the best practices for key rotation and managing multiple keys, but the primary focus remains on the DNS publishability.

Technical article

Documentation from RFC 6376 specifies that the DKIM-Signature header field contains all the necessary information for a verifier to locate the appropriate public key in DNS. This includes the 'd=' tag for the signing domain and the 's=' tag for the selector. The verifier then constructs a query for s._domainkey.d to retrieve a TXT record containing the public key. Any discrepancy in these values or the record's location will lead to a lookup failure.

September 2011 - RFC 6376

Technical article

Amazon SES documentation for DKIM setup indicates that for easy configuration, they provide CNAME records that customers should add to their DNS. These CNAMEs point to Amazon's own DNS, where the actual TXT records with the public keys are hosted. Validation failures often occur if these CNAMEs are not correctly added, or if the domain's name servers are not pointing to the DNS where these CNAMEs reside.

July 2024 - Amazon SES Docs

13 resources

Start improving your email deliverability today

Get started