Look up any domain's DKIM public key record by selector and validate your signature setup
| Domain: | |
| Selector: |
DKIM adds a cryptographic signature to every outgoing email, giving receiving servers a way to verify the message came from you and was not modified in transit.
Your mail server signs outgoing messages with a private key, producing a hash stored in the DKIM-Signature header. Receiving servers retrieve your public key from DNS and verify that hash. A match confirms the message is authentic and unaltered.
A selector is a label that points to a specific public key in your DNS, published at selector._domainkey.yourdomain.com. Selectors let you run multiple DKIM keys simultaneously - useful when rotating keys or using multiple sending services. Find yours in the s= tag of any outbound email header.
Use a minimum of 2048-bit RSA keys - 1024-bit is considered weak and rejected by some receivers. Rotate keys every 6-12 months by publishing a new selector, switching your mail server to sign with the new private key, confirming it passes, then removing the old DNS record.
s= value in the DKIM-Signature headerp= field contains a valid base64 public keyDKIM (DomainKeys Identified Mail) works alongside SPF as a critical email authentication protocol. While SPF verifies the sending IP address, DKIM uses cryptography to confirm the email truly originated from the claimed domain and was not modified by anyone along the way.
When a DKIM-enabled mail server sends a message, it attaches a digital signature to the email header. This signature is created using a private key held by the sender, while the corresponding public key is published as a TXT record in the domain's DNS. Receiving servers retrieve that public key to verify the signature on every incoming message.
If the signature verification succeeds, it confirms the email came from an authorized source and arrived intact. This significantly reduces the risk of spoofing and phishing, where attackers impersonate legitimate senders to deceive recipients.
Once you have it set up, it's time to test it with our very own Email Tester.

| TAG | MEANING |
|---|---|
| v | This tag specifies the DKIM version being used. Currently the most common value is v=DKIM1. |
| a | This tag identifies the cryptographic algorithm used to generate the digital signature. A common value is rsa-sha256. |
| d | This tag indicates the domain name used with the selector to locate the sender's public key in DNS. |
| k | This tag specifies the cryptographic algorithm used to generate the signature - defining how the signature was created and is verified. If missing, the value defaults to rsa. |
| s | This tag specifies the selector record name used to find the public key. It is essentially a subdomain label created by the sender for DKIM purposes. |
| c | This tag specifies the canonicalization method applied to the headers and body before signing. Common values are relaxed/relaxed and simple/simple. |
| h | This tag lists the email header fields included in the signature calculation. Headers not listed here are not protected by DKIM. |
| t | This tag specifies flags that modify DKIM behavior. Valid values include y for testing mode and s for strict subdomain handling, or ys / sy for both. |
Are You Ready To Experience The Difference?
Become a part of the Campaign Cleaner community today, and join countless satisfied customers who have witnessed significant improvements in their email deliverability and campaign success. Don't let HTML issues hold you back; let Campaign Cleaner optimize your campaigns and boost your inbox rates.