Tag | Value |
---|---|
{{ key }} | {{ val }} |
DKIM Checks | |
---|---|
{{ c.label }} |
DomainKeys Identified Mail (DKIM) is an email-authentication method that attaches a cryptographic signature to every message. The recipient validates this signature with a public key published in DNS. A successful match confirms domain identity, deters tampering, and works alongside SPF and DMARC to protect brand reputation and inbox deliverability.
DKIM Checker and Validator lets you fetch and examine a domain’s DKIM record instantly. Enter the domain and selector; the utility retrieves the TXT value by DNS-over-HTTPS, parses each tag, and applies compliance checks that flag weak key lengths, syntax mistakes, and test flags. The tool simplifies routine audits and accelerates troubleshooting.
Validated DKIM records reduce delivery failures, prevent spoofing complaints, and satisfy security policies demanded by receiving platforms. Rapid insight into key length and configuration helps you upgrade 1024-bit keys to stronger 2048-bit pairs and remove forgotten test settings before they harm sender reputation or block marketing campaigns.
No data is transmitted or stored server-side.
The tool runs entirely in your browser and performs each validation step in real time.
Follow these steps to validate any DKIM record.
example.com
) in the Domain field Tip.default
unchanged for common setups.v
, p
, k
, and other values.The answers below clarify common questions.
The selector identifies which public key to retrieve from DNS. You can host multiple selectors to rotate or segment keys across services.
Keys under 2048 bits are now considered weak and are discouraged by major inbox providers. Rotate to 2048-bit or longer keys to maintain deliverability.
Yes. Enter the full sub-domain (for example, mail.example.com
) with its corresponding selector to validate that specific record.
No. All processing happens locally. Only the DNS request is sent to Cloudflare to fetch a public key that is already public by nature.
Rotate keys at least annually or immediately after a suspected compromise. Frequent rotation maintains security without disrupting email flow.
Use this checklist when something looks wrong.
t=y
in production to avoid receiving-server warnings.Go beyond basic checks with these expert practices.