Skip to main content
Home/Resources/Tools/DKIM Checker

Free tool

DKIM record checker

Validate DKIM signatures and verify email authentication configuration. Check public key records, key sizes, and cryptographic signing setup.

Automate everything

InboxKit automatically generates and manages DKIM keys, SPF, DMARC, and BIMI for all your domains.

Get Started

Overview

What is DKIM?

DomainKeys Identified Mail (DKIM) is an email authentication protocol that uses cryptographic signatures to verify that an email message was sent by the domain it claims to be from and that the content has not been tampered with during transit. It is one of the three pillars of email authentication alongside SPF and DMARC.

DKIM works by adding a digital signature header to outgoing emails using a private key held by the sending server. The corresponding public key is published as a DNS TXT record at selector._domainkey.yourdomain.com. Receiving mail servers retrieve this public key and use it to verify the signature, confirming the email's authenticity and integrity.

Record format

What is a DKIM record?

A DKIM record is a DNS TXT record that contains the public key used to verify email signatures. It consists of several key-value pairs that define the key type, algorithm, and the public key data:

Version

v=DKIM1

Identifies the record as DKIM version 1

Key Type

k=rsa

RSA is the standard algorithm (Ed25519 emerging)

Public Key

p=MIGf...

Base64-encoded public key data (2048-bit recommended)

Example DKIM Record

v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBg...

Validation

What our DKIM checker validates

Our free DKIM checker performs a comprehensive analysis of your domain's DKIM configuration:

DNS Record Presence

Verifies that a DKIM TXT record exists at selector._domainkey.yourdomain.com

Record Syntax

Validates the DKIM record format including version tag and key parameters

Public Key Validity

Confirms the public key is properly Base64-encoded and parseable

Key Size Analysis

Checks key length and flags 1024-bit keys as potentially weak

Algorithm Detection

Identifies the signing algorithm (RSA, Ed25519) in use

Selector Auto-Detection

Scans 12+ common selectors to find all active DKIM records

Implementation

How DKIM works & common selectors

How DKIM Works

1. Email signing

Sending mail server signs outgoing messages with a private cryptographic key.

2. DNS publication

Public key is published as a TXT record at selector._domainkey.domain.com.

3. Signature verification

Receiving servers retrieve the public key and verify the email signature.

4. Authentication result

Result is recorded in the Authentication-Results header for DMARC evaluation.

Common Selectors by Provider

Google Workspace

Uses 'google' selector with 2048-bit RSA keys by default.

Microsoft 365

Uses 'selector1' and 'selector2' with CNAME records.

SendGrid

Uses 's1' and 's2' or 'sendgrid' selectors.

Amazon SES

Uses unique selectors with CNAME records pointing to AWS.

2048

Min recommended bits

99%

Provider support

12+

Selectors scanned

Troubleshooting

Common DKIM configuration issues

Missing DKIM record -- No TXT record at selector._domainkey -- check selector name and DNS zone
Wrong selector name -- Selector does not match what your email provider configured
Key size too small -- 1024-bit keys are deprecated; upgrade to 2048-bit for security
Syntax errors in record -- Missing semicolons, incorrect tags, or malformed Base64 key data
DNS propagation delay -- New or updated records can take 24-48 hours to propagate globally
Key revocation (p= empty) -- An empty p= tag means the key has been revoked and is no longer valid

FAQ

Frequently asked questions

A DKIM checker is a tool that validates the DomainKeys Identified Mail (DKIM) record for a specific domain and selector. It queries DNS for the public key published at selector._domainkey.yourdomain.com, verifies the record syntax, and confirms the key can be used to authenticate email signatures.

The DKIM selector is usually provided by your email service provider (e.g., 'google' for Google Workspace, 'selector1' for Microsoft 365). You can also find it in the email headers of a message sent from your domain -- look for the 's=' tag in the DKIM-Signature header. Our auto-detect feature scans the most common selectors automatically.

DKIM adds a cryptographic digital signature to your emails, allowing receiving servers to verify that the message genuinely came from your domain and was not altered in transit. This directly improves inbox placement rates, protects your brand reputation from spoofing, and is required for DMARC alignment -- a prerequisite for BIMI logo display.

If the check fails, common causes include: the DKIM record is missing from DNS, the selector is incorrect, the record has syntax errors, the key has been revoked, or DNS propagation hasn't completed yet. Double-check the selector with your email provider, verify the DNS record is published correctly, and allow 24-48 hours for propagation.

A 2048-bit RSA key is the recommended minimum for DKIM. While 1024-bit keys still technically work, they are considered cryptographically weak and some providers may flag them. Many modern email services now default to 2048-bit keys. If your DNS provider has TXT record length limits, you can split the key across multiple strings within the same record.

Yes, you can have multiple DKIM records using different selectors. This is common when you use multiple email services (e.g., Google Workspace for business email and SendGrid for transactional mail). Each service gets its own unique selector, and all can coexist without conflict since each record lives at a different DNS hostname.

SPF verifies that an email was sent from an authorized IP address by checking the envelope sender, while DKIM verifies that the email content has not been tampered with using cryptographic signatures on the message headers and body. Both are complementary -- SPF authorizes the sending server, DKIM authenticates the message itself. Together they form the foundation for DMARC.

DKIM alignment in DMARC checks that the domain in the DKIM signature (d= tag) matches the From header domain. If alignment fails for both DKIM and SPF, DMARC will apply its configured policy (none, quarantine, or reject). Relaxed alignment allows subdomain matching (e.g., mail.example.com passes for example.com), while strict requires an exact domain match.

DKIM key rotation is the practice of periodically generating new DKIM key pairs and updating your DNS records. This limits the window of exposure if a private key is compromised. Best practice is to rotate keys every 6-12 months. During rotation, publish the new key with a new selector before removing the old one, ensuring uninterrupted email authentication.

After adding or updating a DKIM record in DNS, propagation typically takes 15 minutes to 48 hours depending on your DNS provider and the TTL (Time To Live) settings. During this window, some receiving servers may not yet see your new record. We recommend waiting at least 1 hour before testing, and up to 24 hours for full global propagation.

Get started

Automate your DKIM setup

InboxKit automatically generates and manages 2048-bit DKIM keys, handles DNS configuration, and monitors signing health across all your domains.