Suped

Summary

Mimecast, a popular email security and archiving service, can sometimes interfere with DKIM (DomainKeys Identified Mail) body hash verification, leading to authentication failures. This issue often arises because email security gateways like Mimecast modify email content for various reasons, such as scanning for malware, adding disclaimers, or rewriting URLs for security. Any alteration to the email body after the DKIM signature is applied will cause the body hash to no longer match the calculated hash, resulting in a DKIM failure. Understanding these underlying modifications is crucial for diagnosing and resolving such deliverability challenges.

Suped DMARC monitor
Free forever, no credit card required
Get started for free
Trusted by teams securing millions of inboxes
Company logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logoCompany logo

What email marketers say

Email marketers and deliverability professionals often face challenges with security gateways like Mimecast causing DKIM authentication issues. Many report seeing DKIM body hash failures specifically with Mimecast recipients, even when their emails pass DKIM checks with other providers. The consensus points to Mimecast's inherent mail processing features as the root cause, leading to modifications that invalidate the original DKIM signature.

Marketer view

Marketer from Email Geeks questions whether Mimecast frequently garbles email content, causing DKIM body hash failures, especially when emails are perfectly valid otherwise. They ask if there are specific coding or decoding practices to be aware of, like avoiding 7-bit encoding.

08 Aug 2022 - Email Geeks

Marketer view

Marketer from Email Geeks asks if the DKIM failures are happening at the first hop or are being observed in DMARC reports. This clarifies the stage at which the DKIM signature is being broken.

08 Aug 2022 - Email Geeks

What the experts say

Experts in email deliverability acknowledge that security gateways are a frequent source of DKIM validation issues. Their primary function to protect recipients by altering or scanning content inherently conflicts with DKIM's integrity checks. When a service like Mimecast modifies an email after the sender signs it, the body hash will inevitably fail. Solutions often involve configuration adjustments on either the sending or receiving end, or adopting more flexible authentication standards like ARC (Authenticated Received Chain).

Expert view

Expert from SpamResource highlights that any email security gateway that modifies the message body, even subtly, will break a DKIM signature. This is a fundamental challenge when trying to ensure email integrity through DKIM in a complex email ecosystem.

22 Mar 2025 - SpamResource

Expert view

Expert from DuoCircle explains that unintentional DKIM failures occur when legitimate message modifications, such as those made by antivirus scanners or email archiving systems, alter the email after it has been signed. This is a common issue with security providers like Mimecast.

22 Mar 2025 - DuoCircle

What the documentation says

Official documentation and email authentication standards clarify that DKIM signatures are highly sensitive to any post-signing modifications. RFC 6376, which defines DKIM, specifies how signatures are generated based on the exact content of headers and body. Any intermediary, including email security gateways, that alters the message after signing will cause the cryptographic hash to fail verification. This highlights the inherent tension between robust authentication and necessary security filtering.

Technical article

Documentation from RFC 6376, the standard for DKIM, specifies that the body hash is calculated over the entire body of the message, with a canonicalization algorithm applied. Any change to the body content after signing, no matter how small, will cause the hash to mismatch.

22 Mar 2025 - RFC 6376

Technical article

Documentation from a Mimecast support article states that certain features, such as URL Protection or content scanning, involve modifying the message body to enhance security. While this improves protection, it can interfere with email authentication mechanisms like DKIM if not properly configured.

22 Mar 2025 - Mimecast Support

6 resources

Start improving your email deliverability today

Get started