Mimecast DKIM body hash failures are caused by a confluence of factors. Predominantly, Mimecast's content modification practices, including URL rewriting, adding footers/disclaimers, HTML to plain text conversion, and security scanning, invalidate DKIM signatures. Encoding discrepancies (MIME, character sets), potential issues with Mimecast's DKIM library, and incorrect Mimecast settings (DKIM verification, quarantine) also contribute. Proper signing practices and issues with ARC handling are other considerations. Thorough testing, configuration review, and contacting Mimecast support are recommended.
10 marketer opinions
Mimecast DKIM body hash failures often stem from Mimecast altering email content after the DKIM signature has been applied. This can occur due to various factors, including MIME encoding differences, URL rewriting for tracking, addition of footers or disclaimers, incorrect character encoding conversions (e.g., UTF-8 to ASCII), issues with ARC signature handling, content modification for security scanning, and misconfigured DKIM verification settings. Addressing these issues requires careful configuration, testing, and collaboration with Mimecast support.
Marketer view
Email marketer from MXToolbox suggests that Mimecast's handling of ARC (Authenticated Received Chain) signatures, when forwarding mail can sometimes cause problems. If Mimecast isn't properly preserving ARC signatures, it can impact DKIM verification.
27 Jun 2021 - MXToolbox
Marketer view
Email marketer from Stack Overflow suggests that differences in MIME encoding between the sender and Mimecast could lead to DKIM failures. Specifically, different line endings or character encodings can alter the body hash.
23 Dec 2023 - Stack Overflow
3 expert opinions
Mimecast DKIM body hash failures are often caused by Mimecast modifying email content. This can be due to URL rewriting, adding footers/disclaimers, or converting HTML to plain text, which invalidates the DKIM signature. It's also possible Mimecast uses the same DKIM library with inherent flaws causing failures.
Expert view
Expert from Word to the Wise, Laura Atkins, explains that Mimecast, being a security service, often modifies email content, which can inadvertently cause DKIM body hash failures. This includes actions such as URL rewriting, adding footers or disclaimers, or converting HTML to plain text. These alterations change the message body, invalidating the DKIM signature.
28 Mar 2024 - Word to the Wise
Expert view
Expert from Word to the Wise, Laura Atkins, explains that the most likely cause of a DKIM failure is because the body hash did not verify because the email was altered. Mimecast will at times alter the body of an email and this will lead to DKIM failure.
16 Nov 2021 - Word to the Wise
5 technical articles
DKIM failures in Mimecast are primarily due to content modifications occurring after the DKIM signature is applied. These modifications, which include adding disclaimers, removing attachments, converting formats, or altering whitespace and character encoding, invalidate the original signature. Different DKIM implementations handling body hash calculations differently can also contribute to these failures. Ensuring messages are signed as the final step, after all processing is complete, is crucial to prevent tampering and maintain DKIM validity.
Technical article
Documentation from OpenDKIM explains that different DKIM implementations might handle body hash calculations differently (e.g., using different canonicalization algorithms or handling whitespace in different ways). This can lead to DKIM failures if the sender and Mimecast are using different implementations.
18 Jan 2025 - OpenDKIM.org
Technical article
Documentation from Mimecast explains that if Mimecast modifies the content of an email during processing (e.g., adding a disclaimer, removing attachments, or converting the format), it can cause the DKIM signature to fail verification. This is because the DKIM signature is calculated based on the original content of the email, and any changes will invalidate the signature.
13 Sep 2021 - Mimecast
Can email signatures, especially via Exclaimer, cause SPF or DKIM failures and impact email delivery?
Can linking to PDF files in email cause bounces due to Mimecast or other security filters?
Can URL parameters be captured without a question mark delimiter?
How can I test email deliverability to mailboxes protected by Mimecast?
How do I fix DKIM failing body hash verification?
How do Mimecast and Proofpoint scrutinize senders, and what best practices can improve inbox placement beyond whitelisting?