Introduction
A DKIM record can exist in DNS and still fail validation if the selector, key value, or sending platform does not line up exactly. That breaks message authentication quietly, which then hurts inbox placement, domain reputation, and downstream trust checks. The right fix is to verify the exact selector your mail platform is signing with and make sure DNS is publishing that key in a format resolvers can actually return.
Symptoms
- Mail providers or testing tools report DKIM missing, invalid, or failing alignment
- Messages arrive but fail authentication checks in headers or reports
- A new mail platform was enabled, but DKIM never begins passing
- DNS looks correct at a glance, yet the sender still signs with another selector
- The issue started after copying a long public key into DNS or rotating email providers
Common Causes
- The DKIM selector in DNS does not match the selector used by the sending service
- The TXT record was pasted with broken quotes, spaces, or truncated key content
- DNS hosting split the long value incorrectly or published multiple conflicting TXT records
- The sending platform rotated to a new key that was never added to DNS
- Mail is sent through another provider than the one whose DKIM setup was checked
Step-by-Step Fix
- Confirm which sending platform is currently signing outbound mail for the domain or subdomain in question.
- Identify the exact DKIM selector shown in message headers or platform settings rather than assuming the expected one is active.
- Query the selector record in public DNS and compare the returned key value with the sender's configured public key.
- Check for formatting problems such as broken quoting, extra spaces, truncated strings, or duplicate TXT records at the same name.
- Verify the domain is delegated to the DNS provider where you made the DKIM change so you are editing the live zone.
- Review whether the platform recently rotated selectors or uses a different subdomain for sending than the visible From domain.
- Remove obsolete or conflicting DKIM records only after confirming which selector should remain authoritative.
- Send a fresh test message and inspect the received headers to confirm DKIM now passes with the intended selector.
- Document selector ownership for each mail platform so future provider changes do not leave unused or mismatched keys behind.