Is Google failing DKIM keys shorter than 512 bits?

Today’s Wednesday question comes from Andrew B. and got pushed to Thursday so I could check a few more facts.

Have @Gmail yet confirmed the @ReturnPath story that they’ll start failing weak DKIM sigs? RP cites no source:  @hey4ndr3w

The answer is that no one from Gmail has publicly confirmed that they’re failing to authenticate mail signed with weak DKIM keys. But conversations with various Return Path folks indicate this will happen at some point.

As of the time of this writing, Google is currently marking DKIM mail signed with 512 bit keys with “dkim=pass” and delivering the mail to the inbox. This was confirmed on Twitter Wednesday afternoon.

In case you missed it earlier- there are blog posts circulating about Gmail failing 512 bit DKIM keys, but testing shows 512 bits still pass @evan_burke

I posted earlier about DKIM key lengths and how there are vulnerabilities with shorter signing keys. The most recent revision of the DKIM spec itself states that signers MUST use at least 1024 bits for signing when the keys are intended for long term use. Anyone who is signing with a key less than 1024 and who is not rotating keys regularly is technically not following the DKIM specification.

What does this really mean?

Right now, DKIM authentication lends legitimacy to the signing domain (the d= value). Some ISPs, like Gmail, are using this authentication to present information to the end user about whether or not an email is legitimate. ISPs can trust that the sender of DKIM signed mail is an authorized user of the domain in the d= field because only authorized users have access to the DKIM private key.

When the DKIM key is short (512 bits or less) it can be cracked with a little bit of processing power. The Wired article specifically states that DKIM keys of 512 can be cracked in about 3 days using $75 of Amazon cloud computing. That means that if AnEmailCompany is signing with a DKIM key of 512 bits then a malicious entity could crack that key and send DKIM signed mail spoofing AnEmailCompany. The malicious entity gets the benefit of AnEmailCompany’s domain reputation and AnEmailCompany may see a drop in inbox delivery as the malicious entity sends more spam.

In other words, while the DKIM signature may validate, the mail may not be signed by an authorized entity. It is reasonable for Google, or any other entity checking DKIM signatures, to evaluate the length of a key and the length of time it has been in circulation when deciding to believe authentication results.

In terms of delivery, I expect this means that Google will treat mail signed with insecure keys similarly to mail not signed with DKIM at all.  Delivery decisions (inbox? bulk folder?) will be based on other factors in the email. Positive domain reputation may not help inbox delivery of poor content. And, for some cases, this may result in “via” showing up in the message list for some email.

I don’t believe that “failing DKIM keys shorter than 1024″ means that they’re going to reject or bulk all mail signed with shorter keys. That’s going to hurt an awful lot of wanted mail, and like most mail providers Gmail wants to deliver mail their users want. But they may not trust mail signed with short keys as much as they’ll trust mail signed with secure keys.


Have a question you want me to answer? Tweet them to wise_laura or send them to


Your email address will not be published. Required fields are marked *

  • OTA joins the ISOC

    The Online Trust Alliance (OTA) announced today they were joining forces with the Internet Society (ISOC). Starting in May, they will operate as an initiative under the ISOC umbrella. “The Internet Society and OTA share the belief that trust is the key issue in defining the future value of the Internet,” said Internet Society President and CEO, Kathryn Brown. “Now is the right time for these two organizations to come together to help build user trust in the Internet. At a time when cyber-attacks and identity theft are on the rise, this partnership will help improve security and data privacy for users,” added Brown.No Comments

  • Friday blogging... or lack of it

    It seems the last few Friday's I've been lax on posting. Some of that is just by Friday I'm frantically trying to complete all my client deliverables before the weekend. The rest of it is by Friday I'm just tired. Today had the added complication of watching the Trumpcare debate and following how (and how soon) it would affect my company if it passed. That's been a bit distracting, along with the other stuff I posted about yesterday. I wish everyone a great weekend.1 Comment

  • Indictments in Yahoo data breach

    Today the US government unsealed an indictment against 2 Russian agents and 2 hackers for breaking into Yahoo's servers and stealing personal information. The information gathered during the hack was used to target government officials, security employees and private individuals. Email is so central to our online identity. Compromise an email account and you can get access to social media, and other accounts. Email is the key to the kingdom.No Comments