- Help & API
DomainKeys Identified Mail, or DKIM, is a technical standard that helps protect email senders and recipients from spam, spoofing, and phishing. It is a form of email authentication. DKIM allows an organization to claim responsibility for a message in a way that can be validated by the recipient.
Specifically, DKIM uses an approach called “public key cryptography” to verify that an email message was sent from an authorized mail server, in order to detect forgery and to prevent delivery of harmful email like spam. DKIM supplements SMTP, the basic protocol used to send email, because SMTP does not itself include any authentication mechanisms.
How does DKIM work?
DKIM works by adding a digital signature to the headers of an email message. That signature can be validated against a public cryptographic key in the organization’s Domain Name System (DNS) records. In general terms, the process works like this:
A domain owner publishes a cryptographic public key as a specially-formatted TXT record in the domain’s overall DNS records.
When a mail message is sent by an outbound mail server, the server generates and attaches a unique DKIM signature header to the message. This DKIM-Signature header includes two cryptographic hashes, one of specified headers, and one of the message body (or part of it). The DKIM-Signature header contains information about how the signature was generated.
When an inbound mail server receives an incoming email, it looks up the sender’s public DKIM key in DNS. The inbound server uses this key to decrypt the signature and compare it against a freshly computed version. If the two values match, the message can be proved to authentic and unaltered in transit.
What is a DKIM signature?
A DKIM signature is a header added to email messages. The header contains values that allow a receiving mail server to validate the email message by looking up a sender’s DKIM key and using it to verify the encrypted signature. A DKIM signature header looks something like this:
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
A DKIM signature header packs in a lot of information, as it is intended for automated processing. As you can see in this example, the header contains a list of tag=value parts. Notable tags include “d=” for the signing domain, “b=” for the actual digital signature, and “bh=” for a hash that can be verified by recalculating using the sender’s public key.
DKIM signatures are by definition unique from message to message, but these basic elements will be present in every DKIM signature header.
How is DKIM related to SPF, DMARC, or other standards?
DKIM, SPF, and DMARC are all standards that enable different aspects of email authentication. They address complementary issues.
- SPF allows senders to define which IP addresses are allowed to send mail for a particular domain.
- DKIM provides an encryption key and digital signature that verifies that an email message was not faked or altered.
- DMARC unifies the SPF and DKIM authentication mechanisms into a common framework and allows domain owners to declare how they would like email from that domain to be handled if it fails an authorization test.
Do I need DKIM?
If you are a business sending commercial or transactional email, you definitely need to implement one or more forms of email authentication to verify that an email is actually from you or your business. Properly configuring email authentication standards like DKIM is one of the most important steps you can take to improve your deliverability. However, DKIM by itself only goes so far; SparkPost and other email experts recommend also implementing SPF and DMARC to define a more complete email authentication policy.
Does SparkPost support DKIM?
Yes. SparkPost implements and adheres to email authentication standards including DKIM. In fact, all email we deliver for our users is required to be authenticated. Configuring DKIM is an important step for verifying sending domains when you set up a new SparkPost account.
How can I verify my DKIM settings?
SparkPost’s DKIM Validator is part of our free email tools for developers. It’s the easiest way to verify your messages have working DKIM signatures.
Learn More about DKIM
Read more about DKIM best practices
Learn more about DKIM with these resources from SparkPost’s email experts and elsewhere on the web.
- DKIM.org. The group that developed the DKIM standard has published detailed explanations, how-to’s, and news about DKIM.
- How to Explain DKIM to Your Grandmother [Infographic]. An easy-to-understand explanation of the basic concepts behind DKIM and how it helps to make email safer.
- Three DKIM Challenges You Might Not Know About. An email pro offers three practical tips for making sure you’re implementing DKIM the right way to provide maximum protection for your brand integrity as an email sender.
- Understanding SPF and DKIM In Sixth Grade English. An easy-to-understand explanation of how SPF and DKIM work together to ensure email is authenticated.
Get help with DKIM in the SparkPost Support Center
Learn more about how to configure and use DKIM with the SparkPost service in the SparkPost Support Center.
- Setting up SPF and DKIM with Domain Providers. How-to’s for configuring records that support email authentication at various DNS hosting providers.
- Why do we need to configure SPF and DKIM to send anything? A great explanation of why SparkPost requires that all the email we deliver be authenticated with standards like SPF or DKIM.
- Troubleshooting SPF and DKIM Verification. Tips for ensuring DNS records related to email authentication are propagated properly.
More Essential Email Resources
Develop your email industry expertise and master best practices with SparkPost’s email resources.
The Big Rewards of Email Deliverability
Learn how third-party data shows the deliverability difference between SparkPost and also-ran cloud service providers yields hard, bottom-line benefits.read more