Tag | Value |
---|---|
{{ key }} | {{ val }} |
DKIM Checks | |
---|---|
{{ c.label }} |
DomainKeys Identified Mail (DKIM) attaches a domain-signed header to every outbound message, allowing receiving servers to confirm that the message was authorised and that its contents remained unaltered in transit. The public component of the signing key is published as a TXT record in DNS.
This tool accepts a domain and optional selector, queries the corresponding TXT record through a DNS-over-HTTPS request, then parses its semicolon-delimited tag list. It measures RSA key length, checks mandatory tags, and returns pass-fail summaries you can act on immediately.
Use it when configuring or auditing email authentication to uncover expired, test-only, or weak cryptographic keys before they damage deliverability. Avoid publishing private test selectors on production domains.
DKIM embeds a cryptographic signature inside each message header, binding it to the sending domain. Verifiers reconstruct the signed values, retrieve the public key from DNS, and validate that the signature was generated by the matching private key. Key size, tag completeness, and advisory flags govern overall trust.
k
, p
, v
, t
tags to values.Bits | Assessment |
---|---|
< 1024 | Weak – reject |
1024 – 2047 | Baseline – acceptable |
≥ 2048 | Recommended |
Receiving systems often downgrade messages signed with keys under 1024 bits; 2048 bits or greater aligns with current best practice.
y
indicates testing-only mode.Input : example.com, selector : default
Key length : 2048 bits (rounded) → passes recommended threshold.
ed25519
key types.RFC 6376 formally defines DKIM; numerous M3AAWG and NIST publications discuss recommended key lengths and operational pitfalls.
No user-supplied data is stored; all look-ups occur client-side via public DNS.
Follow these steps to validate any DKIM record.
No; the tool performs DNS queries only and keeps nothing server-side.
Concatenate the quoted parts into one line before pasting into DNS to avoid parse errors.
Keys shorter than 1024 bits are vulnerable to brute-force attacks and may be rejected by major mailbox providers.
Yes, rotating selectors lets you replace keys without mail disruption and simplifies incident response.
The record is in testing mode; remove the flag when you are ready to enforce authentication in production.