Free tool
Validate DKIM signatures and verify email authentication configuration. Check public key records, key sizes, and cryptographic signing setup.
Automate everything
InboxKit automatically generates and manages DKIM keys, SPF, DMARC, and BIMI for all your domains.
Overview
DomainKeys Identified Mail (DKIM) is an email authentication protocol that uses cryptographic signatures to verify that an email message was sent by the domain it claims to be from and that the content has not been tampered with during transit. It is one of the three pillars of email authentication alongside SPF and DMARC.
DKIM works by adding a digital signature header to outgoing emails using a private key held by the sending server. The corresponding public key is published as a DNS TXT record at selector._domainkey.yourdomain.com. Receiving mail servers retrieve this public key and use it to verify the signature, confirming the email's authenticity and integrity.
Record format
A DKIM record is a DNS TXT record that contains the public key used to verify email signatures. It consists of several key-value pairs that define the key type, algorithm, and the public key data:
Version
v=DKIM1Identifies the record as DKIM version 1
Key Type
k=rsaRSA is the standard algorithm (Ed25519 emerging)
Public Key
p=MIGf...Base64-encoded public key data (2048-bit recommended)
Example DKIM Record
v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBg...Validation
Our free DKIM checker performs a comprehensive analysis of your domain's DKIM configuration:
DNS Record Presence
Verifies that a DKIM TXT record exists at selector._domainkey.yourdomain.com
Record Syntax
Validates the DKIM record format including version tag and key parameters
Public Key Validity
Confirms the public key is properly Base64-encoded and parseable
Key Size Analysis
Checks key length and flags 1024-bit keys as potentially weak
Algorithm Detection
Identifies the signing algorithm (RSA, Ed25519) in use
Selector Auto-Detection
Scans 12+ common selectors to find all active DKIM records
Implementation
How DKIM Works
1. Email signing
Sending mail server signs outgoing messages with a private cryptographic key.
2. DNS publication
Public key is published as a TXT record at selector._domainkey.domain.com.
3. Signature verification
Receiving servers retrieve the public key and verify the email signature.
4. Authentication result
Result is recorded in the Authentication-Results header for DMARC evaluation.
Common Selectors by Provider
Google Workspace
Uses 'google' selector with 2048-bit RSA keys by default.
Microsoft 365
Uses 'selector1' and 'selector2' with CNAME records.
SendGrid
Uses 's1' and 's2' or 'sendgrid' selectors.
Amazon SES
Uses unique selectors with CNAME records pointing to AWS.
2048
Min recommended bits
99%
Provider support
12+
Selectors scanned
Troubleshooting
Related
Generate DKIM key pairs and DNS records for email signing.
Try it →Validate SPF records and email sender authorization.
Try it →Check DMARC policy configuration and alignment settings.
Try it →Get a complete email deliverability assessment.
Try it →Test email content for potential spam triggers.
Try it →Comprehensive scan of all email authentication records.
Try it →FAQ
A DKIM checker is a tool that validates the DomainKeys Identified Mail (DKIM) record for a specific domain and selector. It queries DNS for the public key published at selector._domainkey.yourdomain.com, verifies the record syntax, and confirms the key can be used to authenticate email signatures.
The DKIM selector is usually provided by your email service provider (e.g., 'google' for Google Workspace, 'selector1' for Microsoft 365). You can also find it in the email headers of a message sent from your domain -- look for the 's=' tag in the DKIM-Signature header. Our auto-detect feature scans the most common selectors automatically.
DKIM adds a cryptographic digital signature to your emails, allowing receiving servers to verify that the message genuinely came from your domain and was not altered in transit. This directly improves inbox placement rates, protects your brand reputation from spoofing, and is required for DMARC alignment -- a prerequisite for BIMI logo display.
If the check fails, common causes include: the DKIM record is missing from DNS, the selector is incorrect, the record has syntax errors, the key has been revoked, or DNS propagation hasn't completed yet. Double-check the selector with your email provider, verify the DNS record is published correctly, and allow 24-48 hours for propagation.
A 2048-bit RSA key is the recommended minimum for DKIM. While 1024-bit keys still technically work, they are considered cryptographically weak and some providers may flag them. Many modern email services now default to 2048-bit keys. If your DNS provider has TXT record length limits, you can split the key across multiple strings within the same record.
Yes, you can have multiple DKIM records using different selectors. This is common when you use multiple email services (e.g., Google Workspace for business email and SendGrid for transactional mail). Each service gets its own unique selector, and all can coexist without conflict since each record lives at a different DNS hostname.
SPF verifies that an email was sent from an authorized IP address by checking the envelope sender, while DKIM verifies that the email content has not been tampered with using cryptographic signatures on the message headers and body. Both are complementary -- SPF authorizes the sending server, DKIM authenticates the message itself. Together they form the foundation for DMARC.
DKIM alignment in DMARC checks that the domain in the DKIM signature (d= tag) matches the From header domain. If alignment fails for both DKIM and SPF, DMARC will apply its configured policy (none, quarantine, or reject). Relaxed alignment allows subdomain matching (e.g., mail.example.com passes for example.com), while strict requires an exact domain match.
DKIM key rotation is the practice of periodically generating new DKIM key pairs and updating your DNS records. This limits the window of exposure if a private key is compromised. Best practice is to rotate keys every 6-12 months. During rotation, publish the new key with a new selector before removing the old one, ensuring uninterrupted email authentication.
After adding or updating a DKIM record in DNS, propagation typically takes 15 minutes to 48 hours depending on your DNS provider and the TTL (Time To Live) settings. During this window, some receiving servers may not yet see your new record. We recommend waiting at least 1 hour before testing, and up to 24 hours for full global propagation.
Get started
InboxKit automatically generates and manages 2048-bit DKIM keys, handles DNS configuration, and monitors signing health across all your domains.