Suped

Summary

Emails failing DKIM validation on Gmail, particularly those showing a "body hash did not verify" error, are a common challenge for many senders. This issue often points to modifications made to the email's content after it has been signed by DKIM but before it reaches the final recipient. A frequent culprit in corporate environments is an email security gateway or a spam filter, such as Proofpoint, which may alter the email body for various security or compliance reasons, thus invalidating the original DKIM signature. Understanding the flow of your emails through such systems is crucial for diagnosing and resolving these authentication failures.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers often face challenges with DKIM failing on Gmail, especially when corporate security solutions are in play. The primary concern revolves around email content being altered post-DKIM signing, leading to validation failures. Many marketers report encountering the "body hash did not verify" error, indicating that something in the email's content (such as URLs or added footers) has been changed, invalidating the cryptographic signature.

Marketer view

Email marketer from Email Geeks indicates they are experiencing widespread DKIM failures on Gmail for nearly all messages, except those originating directly from Google. This issue manifests as a "body hash did not verify" error when inspecting email originals, suggesting a consistent problem with content integrity after signing.

26 Jan 2024 - Email Geeks

Marketer view

Email marketer from Spiceworks Community shared an issue where emails fail SPF hard fail, even though DKIM is set up and the sending server is included in SPF. This suggests complex interactions between authentication protocols and security configurations that can lead to unexpected failures.

15 Mar 2023 - Spiceworks Community

What the experts say

Email deliverability experts consistently point to email security gateways as a primary cause of DKIM validation failures, especially the common "body hash did not verify" error. Their consensus is that these systems, designed to protect users from threats, often inadvertently modify email content (e.g., rewriting URLs, adding disclaimers) after the original DKIM signature has been applied. This modification breaks the cryptographic link between the email content and its signature, leading to authentication failures at the receiving end, such as Gmail.

Expert view

Email expert from Email Geeks explains that the DKIM signing domain and public key exist, but the issue lies elsewhere. They clarify that while the public key for the specific selector scph0520._domainkey.really.reallygoodemails.com is properly published in DNS, the "body hash did not verify" error indicates a post-signing modification.

26 Jan 2024 - Email Geeks

Expert view

Email expert from Spam Resource notes that email security gateways, especially those that perform URL rewriting or content modification, are common culprits for breaking DKIM signatures. These tools are designed to protect, but their actions can inadvertently invalidate the email's integrity stamp.

10 Apr 2023 - Spam Resource

What the documentation says

Official documentation and technical guides emphasize that DKIM validation hinges on the integrity of the email content from the point of signing to reception. Any modification to the signed parts of an email, including the body, headers, or attachments, will cause the DKIM signature to fail. This is precisely why security solutions that alter email content, such as URL rewriting or adding disclaimers, must be carefully configured to either re-sign the email (using technologies like ARC) or be exempted from modifying signed elements to preserve DKIM authenticity.

Technical article

Documentation from Vircom Support clarifies that Proofpoint Essentials has already scanned incoming emails for SPF and/or DKIM issues, and emails with issues are scored accordingly. This indicates that Proofpoint is an active participant in the authentication process and can influence results before messages reach their final destination like Gmail.

08 Sep 2023 - Vircom Support

Technical article

Documentation from AutoSPF explains that if an email fails SPF and/or DKIM, it will also fail the DMARC check. This is where ARC (Authenticated Received Chain) becomes useful, as it allows intermediary systems to modify emails while preserving their authentication history, which is critical for maintaining DMARC validity.

01 Jul 2024 - AutoSPF

10 resources

Start improving your email deliverability today

Get started