<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>DKIM on Sender Audit Blog</title><link>https://senderaudit.com/blog/en/tags/dkim/</link><description>Recent content in DKIM on Sender Audit Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Sun, 26 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://senderaudit.com/blog/en/tags/dkim/index.xml" rel="self" type="application/rss+xml"/><item><title>Email and DNS: Every Record You Need to Know</title><link>https://senderaudit.com/blog/en/email-and-dns/</link><pubDate>Sun, 26 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/email-and-dns/</guid><description>&lt;p&gt;DNS is the invisible foundation of email. Without the right records, your emails won&amp;rsquo;t be delivered, authenticated, or encrypted. Here are &lt;strong&gt;all the DNS records&lt;/strong&gt; a sending domain needs to know and configure.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Record&lt;/th&gt;
 &lt;th&gt;Type&lt;/th&gt;
 &lt;th&gt;Role&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;MX&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;MX&lt;/td&gt;
 &lt;td&gt;Where to deliver emails for your domain&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;SPF&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Who can send for your domain&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;DKIM&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT/CNAME&lt;/td&gt;
 &lt;td&gt;Public key for verifying signatures&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;DMARC&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;SPF + DKIM alignment policy&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;MTA-STS&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT + HTTPS&lt;/td&gt;
 &lt;td&gt;Enforce TLS encryption&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;TLS-RPT&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Reports on TLS failures&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;BIMI&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Verified logo in the inbox&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;PTR&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;PTR&lt;/td&gt;
 &lt;td&gt;Reverse DNS for your sending IPs&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="mx-where-to-deliver-emails"&gt;MX: Where to Deliver Emails&lt;/h2&gt;
&lt;p&gt;The MX (Mail Exchange) record specifies which servers receive emails for your domain.&lt;/p&gt;</description></item><item><title>Email Headers Explained: From Received to ARC</title><link>https://senderaudit.com/blog/en/email-headers-explained/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/email-headers-explained/</guid><description>&lt;p&gt;Email headers contain the complete story of a message&amp;rsquo;s journey: who sent it, which servers it passed through, whether authentication succeeded, and why it landed in spam. Knowing how to read them means knowing how to diagnose.&lt;/p&gt;
&lt;h2 id="how-to-access-headers"&gt;How to Access Headers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Gmail&lt;/strong&gt;: open the email → ⋮ → &amp;ldquo;Show original&amp;rdquo;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Outlook&lt;/strong&gt;: open the email → File → Properties → &amp;ldquo;Internet headers&amp;rdquo;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Apple Mail&lt;/strong&gt;: View → Message → All Headers&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Thunderbird&lt;/strong&gt;: View → Message Source&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Or paste them directly into Sender Audit&amp;rsquo;s &lt;a href="https://senderaudit.com/header-analyzer"&gt;Header Analyzer&lt;/a&gt; for a visual analysis.&lt;/p&gt;</description></item><item><title>Anatomy of a DKIM Signature: Every Field Explained</title><link>https://senderaudit.com/blog/en/dkim-signature-anatomy/</link><pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dkim-signature-anatomy/</guid><description>&lt;p&gt;You know that &lt;a href="https://senderaudit.com/blog/en/configure-dkim/"&gt;DKIM&lt;/a&gt; signs your emails. But what exactly is inside that &lt;code&gt;DKIM-Signature&lt;/code&gt; header? Let&amp;rsquo;s break down every field and follow the verification process from start to finish.&lt;/p&gt;
&lt;h2 id="a-real-dkim-header-dissected"&gt;A Real DKIM Header, Dissected&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=example.com; s=selector2024;
 h=from:to:subject:date:mime-version:content-type;
 bh=2jUSOH9NhtVGCQWNr9BrIAPreKQjO6Sn7XIkfJVOzv8=;
 t=1714123456;
 b=dHJ5aW5nIHRvIHJlYWQgdGhpcyBzaWduYXR1cmU/IE5pY2Ug
 dHJ5IDspIFRoaXMgaXMganVzdCBhIGR1bW15IGV4YW1wbGU=
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id="every-field-explained"&gt;Every Field Explained&lt;/h2&gt;
&lt;h3 id="v1-version"&gt;&lt;code&gt;v=1&lt;/code&gt;: Version&lt;/h3&gt;
&lt;p&gt;The DKIM protocol version. Only one version exists (&lt;code&gt;1&lt;/code&gt;), defined by &lt;a href="https://datatracker.ietf.org/doc/html/rfc6376"&gt;RFC 6376&lt;/a&gt;. This field is mandatory.&lt;/p&gt;
&lt;h3 id="arsa-sha256-algorithm"&gt;&lt;code&gt;a=rsa-sha256&lt;/code&gt;: Algorithm&lt;/h3&gt;
&lt;p&gt;Two elements combined:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cryptosystem&lt;/strong&gt;: &lt;code&gt;rsa&lt;/code&gt; (most common) or &lt;code&gt;ed25519&lt;/code&gt; (emerging, &lt;a href="https://datatracker.ietf.org/doc/html/rfc8463"&gt;RFC 8463&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hash function&lt;/strong&gt;: &lt;code&gt;sha256&lt;/code&gt; (standard) or &lt;code&gt;sha1&lt;/code&gt; (obsolete and vulnerable, do not use)&lt;/li&gt;
&lt;/ul&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Combination&lt;/th&gt;
 &lt;th&gt;Status&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;rsa-sha256&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Standard, recommended&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;rsa-sha1&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Obsolete, some providers reject it&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;ed25519-sha256&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Future standard, partial support&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="crelaxedrelaxed-canonicalization"&gt;&lt;code&gt;c=relaxed/relaxed&lt;/code&gt;: Canonicalization&lt;/h3&gt;
&lt;p&gt;Defines how content is normalized &lt;strong&gt;before&lt;/strong&gt; computing the signature. The format is &lt;code&gt;headers/body&lt;/code&gt;:&lt;/p&gt;</description></item><item><title>DKIM RSA Key Size: 1024 vs 2048 Bits and the Future with Ed25519</title><link>https://senderaudit.com/blog/en/dkim-rsa-key-size/</link><pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dkim-rsa-key-size/</guid><description>&lt;p&gt;Your DKIM setup works, signatures pass. But have you checked the &lt;strong&gt;size of your RSA key&lt;/strong&gt;? A key that&amp;rsquo;s too short is a ticking time bomb: it could be cracked, allowing an attacker to sign emails on your behalf.&lt;/p&gt;
&lt;h2 id="the-history-of-dkim-keys-from-512-to-2048-bits"&gt;The History of DKIM Keys: From 512 to 2048 Bits&lt;/h2&gt;
&lt;h3 id="2012-the-end-of-512-bit-keys"&gt;2012: The End of 512-Bit Keys&lt;/h3&gt;
&lt;p&gt;In 2012, researchers demonstrated that a 512-bit RSA key could be cracked in &lt;strong&gt;under 72 hours&lt;/strong&gt; using cheap cloud computing power. The result: anyone could impersonate a domain using a 512-bit key and send perfectly DKIM-signed emails.&lt;/p&gt;</description></item><item><title>Why Do You See Two DKIM Signatures on a Single Email?</title><link>https://senderaudit.com/blog/en/double-dkim-signature/</link><pubDate>Thu, 05 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/double-dkim-signature/</guid><description>&lt;p&gt;You inspect the headers of an email sent through your ESP (Brevo, Mailchimp, SendGrid…) and notice &lt;strong&gt;two distinct DKIM signatures&lt;/strong&gt;: one with your domain, one with the ESP&amp;rsquo;s domain. Is this normal? Absolutely, and it&amp;rsquo;s actually desirable.&lt;/p&gt;
&lt;h2 id="what-it-looks-like-in-the-headers"&gt;What It Looks Like in the Headers&lt;/h2&gt;
&lt;p&gt;Here&amp;rsquo;s a typical &lt;code&gt;Authentication-Results&lt;/code&gt; example:&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;Authentication-Results: mx.google.com;
 dkim=pass header.i=@yourdomain.com header.s=mail header.b=xjAWgYt1;
 dkim=pass header.i=@esp-domain.com header.s=mail header.b=zNRqfud1;
 spf=pass ...
 dmarc=pass (p=REJECT) header.from=yourdomain.com
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;And two &lt;code&gt;DKIM-Signature:&lt;/code&gt; blocks in the message: one with &lt;code&gt;d=yourdomain.com&lt;/code&gt;, the other with &lt;code&gt;d=esp-domain.com&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>DKIM: Sign Your Emails to Prove Their Authenticity</title><link>https://senderaudit.com/blog/en/configure-dkim/</link><pubDate>Sat, 24 Jan 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-dkim/</guid><description>&lt;p&gt;DKIM (DomainKeys Identified Mail) adds a cryptographic signature to every outgoing email. The receiving server can verify that the message wasn&amp;rsquo;t altered in transit and that it came from an authorized sender. It&amp;rsquo;s the second pillar of email authentication, after &lt;a href="https://senderaudit.com/blog/en/configure-spf/"&gt;SPF&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="how-dkim-works-the-simple-version"&gt;How DKIM Works, The Simple Version&lt;/h2&gt;
&lt;p&gt;Think of it like sending a letter with a wax seal. The recipient can verify the seal isn&amp;rsquo;t broken (the message is intact) and that the seal matches your crest (you&amp;rsquo;re the legitimate sender).&lt;/p&gt;</description></item></channel></rss>