Why is DKIM failing on Gmail, and is Proofpoint causing it?

Summary

DKIM failures in Gmail are frequently caused by alterations to email content during transit. Proofpoint and similar third-party security solutions often rewrite URLs, add disclaimers, or modify content for security scanning purposes, invalidating the DKIM signature. Corporate email policies, internal filtering systems, and email forwarding can also alter content, leading to DKIM failures. Incorrect DKIM setup, DNS configuration errors, and issues with cryptographic keys are additional contributing factors. SPF is similarly susceptible to breakage. Regular testing of email authentication and education on security software impact are crucial for preventing DKIM failures.

Key findings

  • Third-Party Security Interference: Third-party security solutions like Proofpoint often modify email content, causing DKIM failures.
  • Content Modification: Alterations to email body, headers, or content after signing invalidate the DKIM signature.
  • Corporate Email Policies: Corporate policies introducing disclaimers or URL rewriting can cause DKIM failures.
  • Configuration Issues: Incorrect DKIM setup, DNS configuration, or key issues contribute to DKIM failures.
  • Forwarding Impacts: Email forwarding servers can modify headers or body, causing DKIM signature invalidation.

Key considerations

  • Regular Testing: Regularly test DKIM setup to detect failures caused by third-party services or internal policies.
  • Education on Security Software: Educate internal teams about the impact of security software on email authentication.
  • Proper DKIM Configuration: Ensure robust DKIM key size, correct DNS record setup, and proper header signing.
  • Monitor Third-Party Impact: Monitor the impact of third-party services on email content to prevent DKIM failures.
  • DKIM-Aware Forwarding: Use DKIM-aware forwarding services to prevent signature invalidation during email forwarding.

What email marketers say
12Marketer opinions

DKIM failures in Gmail often stem from alterations to email content during transit. These alterations can be due to corporate email policies, third-party security services like Proofpoint (which rewrites URLs for threat analysis), or even email personalization software. SPF is also susceptible to these modifications. Modifying email content invalidates the DKIM signature, which then causes the authentication check in Gmail to fail.

Key opinions

  • Third-Party Interference: Security solutions such as Proofpoint, Mimecast and corporate spam filters frequently rewrite URLs and modify email content for security purposes, leading to DKIM failure.
  • Content Modification: Any changes to the email body, headers, or attached content after DKIM signing will invalidate the signature and cause failure.
  • Corporate Policies: Corporate email policies that add disclaimers or alter subject lines can also invalidate DKIM.
  • SPF Susceptibility: SPF is also susceptible to breakage by intermediate servers, though DKIM is designed to be more resilient in these cases.

Key considerations

  • Regular Testing: Regularly test your DKIM setup to ensure third-party services or internal policies aren't causing failures.
  • Key Size and Configuration: Ensure you have a robust DKIM key size and that your DNS records are configured correctly.
  • Educate Internal Teams: Educate internal teams about the impact of security software on email authentication to prevent unintended modifications.
  • Content Integrity: Minimize unnecessary modifications to email content during transit to maintain DKIM validity.
Marketer view

Marketer from Email Geeks shares that Proofpoint's TAP is likely breaking DKIM with URL rewriting.

July 2021 - Email Geeks
Marketer view

Email marketer from dmarc.org writes that SPF, DKIM and DMARC are the main ways of authenticating email, however, due to the nature of SPF, changes in message content are more likely to cause authentication failure, so DKIM is often chosen as a better method.

January 2022 - dmarc.org
Marketer view

Marketer from Email Geeks shares that spam filters and corporate banners will almost always break SPF/DKIM by design.

February 2025 - Email Geeks
Marketer view

Marketer from Email Geeks explains that SPF is always susceptible because the sender is unlikely to have the Proofpoint ranges in their SPF record. However, most customers exempt their spam filters' IP ranges from further scanning by the mailbox provider.

June 2023 - Email Geeks
Marketer view

Email marketer from SuperUser Forum answers that security appliances or spam filters that modify the email content (like adding footers or scanning/rewriting links) can cause DKIM to break. The original signature doesn't match the altered content, so Gmail flags it as a failure.

March 2025 - Superuser
Marketer view

Email marketer from EmailOnAcid explains that you can minimize DKIM failures by ensuring you're signing all the right headers, setting up a robust DKIM key size and regularly testing your configuration. It's also important to educate internal teams that use security software to prevent content modification.

October 2023 - EmailOnAcid
Marketer view

Email marketer from EmailDrip mentions that DKIM can fail due to email forwarding, changes made by security services such as Proofpoint, or even by software used to personalize the email. If the contents of the email change, the DKIM signature breaks, leading to failure.

May 2024 - EmailDrip
Marketer view

Email marketer from Stack Overflow explains that internal email filtering systems or corporate email policies can modify emails before they reach Gmail. These modifications include adding disclaimers, rewriting URLs, or even changing the subject line, all of which can cause DKIM to fail.

June 2023 - Stack Overflow
Marketer view

Email marketer from Valimail Blog shares that Proofpoint, and similar security tools, can indeed interfere with DKIM. This typically occurs when these services rewrite URLs or modify email content for security scanning purposes. This modification breaks the DKIM signature, causing it to fail verification at the receiving end, such as Gmail.

September 2023 - Valimail Blog
Marketer view

Email marketer from Reddit user explains that Proofpoint often breaks DKIM by rewriting URLs for threat analysis. This changes the email's content, making the original DKIM signature invalid when Gmail checks it.

August 2024 - Reddit
Marketer view

Email marketer from MXToolbox shares that common causes for DKIM failures include: modifications to the email body or headers during transit, incorrect DNS configuration for the DKIM record, and issues with the cryptographic key used for signing. They also highlight that third-party email security services can be a cause.

April 2021 - MXToolbox
Marketer view

Marketer from Email Geeks explains that work email setups can rewrite or modify emails by adding disclaimers or rewriting URLs, which will cause DKIM to fail. This often happens when corporate IT uses solutions like Proofpoint in front of GSuite.

August 2021 - Email Geeks

What the experts say
2Expert opinions

DKIM failures in Gmail are often caused by third-party email security solutions, such as Proofpoint, that modify email content, add disclaimers, or rewrite URLs for security scanning purposes. This modification breaks the DKIM signature, leading to authentication failure. Therefore, regular testing of email authentication is crucial to identify if third-party services are invalidating the signing process.

Key opinions

  • Third-Party Security Solutions: Third-party email security solutions, including Proofpoint, are a common cause of DKIM failures.
  • Email Content Modification: Modifications to email content, such as adding disclaimers or rewriting URLs, break the DKIM signature.

Key considerations

  • Regular Testing: Implement regular testing of email authentication to ensure third-party services are not invalidating the signing process.
  • Authentication Monitoring: Monitor email authentication results to quickly identify and address DKIM failures caused by third-party services.
Expert view

Expert from SpamResource shares that third-party email security solutions can often cause DKIM failures. These solutions, including Proofpoint, may modify email content, add disclaimers, or rewrite URLs for security scanning, which breaks the DKIM signature.

May 2024 - SpamResource
Expert view

Expert from Word to the Wise shares that it is always best practice to test your authentication on a regular basis to ensure that third party services which may be altering your email, such as Proofpoint or similar, are not invalidating the signing process

March 2024 - Word to the Wise

What the documentation says
5Technical articles

DKIM failures in Gmail, as highlighted by various documentation sources, are primarily attributed to alterations of email content during transit. These alterations can occur due to a number of reasons including modification by mailing lists, forwarding services, gateway servers, email marketing tools, or security gateways such as Microsoft's Exchange Online Protection (EOP). These services and processes often modify the email headers or body. Erroneous DKIM setup, incorrect key size or DNS record errors may also lead to failures. Since DKIM relies on the integrity of the message content, any changes, intentional or otherwise, invalidates the DKIM signature.

Key findings

  • Message Alteration: Altering email content in transit is a primary cause for DKIM failures.
  • Forwarding Issues: Email forwarding, when the forwarding server modifies the headers or body, leads to DKIM failures.
  • Third-Party Services: Third-party email services, including email marketing tools and security gateways, can modify email content and trigger DKIM failures.
  • Configuration Errors: Incorrect DKIM setup, key size, or DNS record errors contribute to DKIM failures.

Key considerations

  • Maintain Message Integrity: Ensuring the integrity of the email message throughout the delivery process is crucial to prevent DKIM failures.
  • Configuration Review: Regularly review DKIM setup, key size, and DNS records to ensure they are correctly configured.
  • DKIM-Aware Forwarding: Use DKIM-aware forwarding services to prevent signature invalidation.
  • Monitor Third-Party Impact: Monitor the impact of third-party services and tools on email content to avoid unintended DKIM failures.
Technical article

Documentation from Microsoft explains that Exchange Online Protection (EOP) can affect DKIM if it modifies the email content. EOP is designed to protect against spam and malware, and in doing so, it might rewrite URLs or add disclaimers, invalidating the original DKIM signature.

August 2021 - Microsoft
Technical article

Documentation from DMARC Analyzer mentions that email forwarding is a common cause of DKIM failures. When an email is forwarded, the forwarding server often modifies the email headers or body, which invalidates the DKIM signature. This is particularly problematic when the forwarder is not DKIM-aware.

May 2024 - DMARC Analyzer
Technical article

Documentation from RFC 6376 explains that DKIM relies on the integrity of the message content. Any alteration to the signed parts of the message, whether intentional or unintentional, will cause the DKIM signature verification to fail. This includes changes to headers, body, or any other signed fields.

November 2024 - RFC Editor
Technical article

Documentation from AuthSMTP mentions that DKIM problems often come from third-party email services. These services might modify the email, which then leads to DKIM failing. This is common with email marketing tools and security gateways.

August 2021 - AuthSMTP
Technical article

Documentation from Google Workspace Admin Help explains that DKIM failures can occur if the message content is altered in transit. This includes changes by mailing lists, forwarding services, or when a gateway server modifies the email. Also, incorrect DKIM setup, key size, or DNS record errors may cause failures.

August 2021 - Google Workspace Admin Help