On 10/15/25 1:03 PM, ed bennett wrote:
I spent a lot of time searching for pages about DMARC and DKIM. I found a lot 
of conflicting information, a lack of information and so forth.
But I did not find anything about needing to split up the keys this way. Of 
course my DKIM attempts simply failed and I had no idea why.

For everything mail, my go-to is always the RFCs. This is covered in the RFC:

https://www.rfc-editor.org/rfc/rfc8301#section-1

You can also use this site as a great place for just these sorts of things:

https://explained-from-first-principles.com/email/

It seems notable that RSA 1024-bit is still part of the standard. My understanding is that it is still difficult to brute-force an RSA 1024-bit key and I've yet to see anyone produce a good reason to use 2048-bit for DKIM signing as the benefit seems rather low. I've configured several servers to sign using RSA 1024-bit and Ed25519, so the server follows the standards, doesn't have DNS-related issues, and a signature is stronger than RSA 2048-bit.

Paul

Reply via email to