{"id":61032,"date":"2026-04-28T09:08:55","date_gmt":"2026-04-28T09:08:55","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=61032"},"modified":"2026-04-28T12:36:18","modified_gmt":"2026-04-28T12:36:18","slug":"dkim2-explained-whats-changing-and-what-to-do","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/","title":{"rendered":"DKIM2 Explained: What&#8217;s Changing and What to Do"},"content":{"rendered":"\n<p>Our team was at a Deliverability Summit where Richard Clayton, one of the authors of the DKIM2 specification, gave a talk on where the spec is at, what it changes, and what we should all expect over the next couple of years. We came back with a much clearer picture than we had before, and since I haven&#8217;t seen many practical write-ups yet, I figured I&#8217;d share what we learned.<\/p>\n\n\n\n<p>This is going to be technical, but I&#8217;ll try to keep it readable. If you&#8217;ve been wondering whether DKIM2 is something you need to start preparing for, the short answer is &#8220;yes, but not in a panic kind of way.&#8221; Here&#8217;s the longer version.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-we-need-dkim2-in-the-first-place\"><strong>Why We Need DKIM2 in the First Place<\/strong><\/h2>\n\n\n\n<p>DKIM1 has been around since 2007. It works. But it has three specific problems that have gotten worse as email infrastructure has gotten more complex.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-dkim-replay-attacks\"><strong>DKIM replay attacks<\/strong><\/h3>\n\n\n\n<p>This is probably the biggest motivator. The way DKIM1 works, the signature covers the message body and selected headers, but it does <em>not<\/em> cover who the message is actually being sent to. So if a spammer can get a single legitimately-signed message out of a high-reputation sender (say, a free email account they registered themselves), they can re-send that exact signed message to millions of other recipients. The <a href=\"https:\/\/easydmarc.com\/blog\/what-is-a-dkim-signature\/\">DKIM signature<\/a> stays valid. The receiving server sees a perfectly good signature from a trusted domain and tends to give it a pass. This is one of the larger sources of spam today, and DKIM1 has no answer for it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mailing-lists-and-p-reject\"><strong>Mailing lists and p=reject<\/strong><\/h3>\n\n\n\n<p>Every email person has seen this scenario. A domain publishes p=reject in their DMARC record. A user on that domain sends mail to a mailing list. The mailing list does what mailing lists do, adding a footer or rewriting the subject, and sends it out to all the subscribers. Those modifications break the DKIM signature. SPF doesn&#8217;t align because the mailing list is the one sending now. DMARC fails. p=reject says &#8220;throw it away.&#8221; Suddenly legitimate list traffic is getting bounced and list operators have to do ugly workarounds like ARC or From-rewriting.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-backscatter\"><strong>Backscatter<\/strong><\/h3>\n\n\n\n<p>When mail bounces, the bounce goes back to the envelope sender (the RFC5321 MAIL FROM). That envelope can be forged. So when spammers forge your domain in the envelope and blast out garbage, every bounce comes back to you. Your inbox fills up with delivery failures for messages you never sent. DKIM1 doesn&#8217;t sign the envelope, so there&#8217;s no way for receivers to know it&#8217;s been spoofed.<\/p>\n\n\n\n<p>DKIM2 is designed to address all three of these.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-dkim2-actually-changes\"><strong>What DKIM2 actually changes<\/strong><\/h2>\n\n\n\n<p>The mechanics are pretty elegant once you see them. Two new header fields do most of the work.<\/p>\n\n\n\n<p><strong>The <\/strong><strong>Message-Instance<\/strong><strong> header<\/strong> holds hashes of the message body and headers, plus what Richard called &#8220;recipes,&#8221; which are a record of any modifications that have been made to the message in transit. So if a mailing list adds a footer, that modification is recorded in the recipe. A downstream verifier can replay the recipe against the original hash and confirm that the chain of changes is legitimate and accounted for.<\/p>\n\n\n\n<p><strong>The <\/strong><strong>DKIM2-Signature<\/strong><strong> header<\/strong> is the actual cryptographic signature. The big change here is that it signs the <strong>RFC5321 envelope values<\/strong>: the MAIL FROM and the RCPT TO. This is the part that kills replay attacks. If a spammer captures a signed message and tries to resend it to new recipients, the RCPT TO won&#8217;t match what was signed, and verification fails. The free ride is over.<\/p>\n\n\n\n<p>The other big shift in DKIM2 is that <strong>every hop in the delivery chain signs<\/strong>. You don&#8217;t get a single signature at the start that has to survive every modification along the way. You get a chain. Each handler signs what they&#8217;re sending, records any modifications they made, and passes it on. By the time the message reaches the final inbox, there&#8217;s a verifiable record of exactly what touched it and what they did.<\/p>\n\n\n\n<p>This is what fixes the mailing list problem. The mailing list can legitimately modify the message, sign their version, and the receiving server can see the whole chain: the original sender&#8217;s signature is valid on the original content, the mailing list signed their modification, here&#8217;s what they changed, everyone is who they say they are. No more pretending that p=reject and active mailing lists can coexist through duct tape.<\/p>\n\n\n\n<p>It also fixes backscatter, because the chain is signed end to end. Bounces follow the signed path back to the actual previous hop, not whatever forged address happens to be in the envelope.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-you-don-t-need-to-change-your-dns\"><strong>You don&#8217;t need to change your DNS<\/strong><\/h2>\n\n\n\n<p>This is the part I want to highlight because I think it&#8217;s going to confuse people. DKIM2 <strong>reuses your existing DKIM1 keys<\/strong>. You don&#8217;t need to publish new selectors. You don&#8217;t need to rotate anything. The same key material that signs your DKIM1 signatures today will sign your DKIM2 signatures tomorrow.<\/p>\n\n\n\n<p>What changes is the signing software on the sending side and the verification software on the receiving side. From the perspective of a domain owner, meaning the people whose domains we manage at EasyDMARC, there&#8217;s nothing to do in DNS. Your ESP, your transactional mail provider, your own MTA. Those are the places where the work happens.<\/p>\n\n\n\n<p>That&#8217;s a smart design choice. Standards that require every domain on the planet to update DNS records take a decade to roll out. DKIM2 sidesteps that entirely.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-bounce-handling-gets-better\"><strong>Bounce handling gets better<\/strong><\/h2>\n\n\n\n<p>Two real changes here.<\/p>\n\n\n\n<p id=\"h-backscatter-goes-away-today-if-a-spammer-puts-your-address-in-the-envelope-mail-from-and-blasts-mail-to-invalid-addresses-the-bounces-from-those-invalid-addresses-can-come-straight-to-your-inbox-receivers-have-no-way-to-verify-whether-the-envelope-is-legitimate-dkim2-closes-this-by-requiring-the-return-path-to-align-with-the-signing-domain-and-signing-it-so-a-receiver-can-verify-the-return-path-before-generating-any-bounce-forged-envelopes-don-t-produce-bounces-forwarders-are-accommodated-cleanly-by-rewriting-and-re-signing-their-own-return-path-at-each-hop-so-each-hop-owns-its-return-path-cryptographically-and-bounces-follow-the-actual-chain\"><strong>Backscatter goes away.<\/strong> Today, if a spammer puts your address in the envelope MAIL FROM and blasts mail to invalid addresses, the bounces from those invalid addresses can come straight to your inbox. Receivers have no way to verify whether the envelope is legitimate. DKIM2 closes this by requiring the return path to align with the signing domain and signing it, so a receiver can verify the return path before generating any bounce. Forged envelopes don&#8217;t produce bounces. Forwarders are accommodated cleanly by rewriting and re-signing their own return path at each hop, so each hop owns its return path cryptographically and bounces follow the actual chain.<\/p>\n\n\n\n<p><strong>Async bounce volumes will likely rise.<\/strong> Mailbox providers have minimized asynchronous bounces (the kind that arrive minutes or hours after delivery, as a separate email) because untrusted return paths made them risky to use. Trustworthy return paths remove that risk. If you run sending infrastructure, it&#8217;s worth checking with your platform team that your async bounce handling is ready for higher volumes. For domain owners, this mostly affects how delivery and bounce reporting looks in your dashboards.<\/p>\n\n\n\n<p>One note on VERP since people sometimes conflate it with this change: VERP (Variable Envelope Return Path) doesn&#8217;t get replaced by DKIM2. VERP solves the problem of identifying which original message a bounce corresponds to. DKIM2 solves the problem of trusting that the return path is real. Different problems, and both stay useful.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-the-transition-dual-signing\"><strong>The Transition: Dual Signing<\/strong><\/h2>\n\n\n\n<p>For at least the next couple of years, every message that wants to be DKIM2-signed is also going to be DKIM1-signed. This is &#8220;dual signing&#8221; and it&#8217;s expected to be the default during the entire transition period. DKIM1 verifiers ignore the new headers they don&#8217;t understand. DKIM2 verifiers use the new signature when they see it and fall back to DKIM1 when they don&#8217;t. Nobody breaks.<\/p>\n\n\n\n<p>This is a sensible path. It also means there&#8217;s no flag day, no specific morning where DKIM1 suddenly stops working. It&#8217;ll be a gradual shift over years.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-timeline\"><strong>Timeline<\/strong><\/h2>\n\n\n\n<p>Here&#8217;s roughly where things are heading, based on what Richard laid out at the summit:<\/p>\n\n\n\n<p><strong>Q4 2026: <\/strong>Major mailbox providers (Google, Yahoo, the usual suspects) start running DKIM2 in experimental mode. They&#8217;ll be verifying signatures and surfacing the results somewhere visible to senders, most likely through <a href=\"https:\/\/easydmarc.com\/blog\/understanding-dmarc-reports\/\">DMARC aggregate reports<\/a> and the existing Authentication-Results header.<\/p>\n\n\n\n<p><strong>Q1 2027:<\/strong> production rollouts.<\/p>\n\n\n\n<p>These dates may slip. But this is the shape of the thing, and the direction isn&#8217;t going to change.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-receivers-n-eed-to-do\"><strong>What receivers <\/strong>n<strong>eed to do<\/strong><\/h2>\n\n\n\n<p>If you&#8217;re operating mail infrastructure on the receiving side, you need to start thinking about DKIM2 verification capability now. The new header fields, envelope binding, and chain validation all need to be implemented. The good news is the spec leans heavily on existing DKIM1 mechanics, so it&#8217;s an extension of code that already exists in most MTAs and filtering systems rather than a from-scratch rewrite.<\/p>\n\n\n\n<p>The harder part is going to be policy. What do you do when DKIM1 passes but DKIM2 fails? What about the inverse? How do you weight a chain with three intermediate hops versus one with seven? When does a broken chain become suspicious enough to act on? These are the questions every receiving operator is going to be working through over the next 18 months, and there isn&#8217;t going to be one right answer.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-senders-should-do-now\"><strong>What senders should do now<\/strong><\/h2>\n\n\n\n<p>Honestly, not much. DKIM2 isn&#8217;t deployed yet, and the spec is still being finalized. There&#8217;s no product or configuration change you can make on your domain today that gets you DKIM2 ahead of the rollout.<\/p>\n\n\n\n<p>What you <em>can<\/em> do is prepare the things that will matter when DKIM2 lands.<\/p>\n\n\n\n<p>Activate DMARC reporting and actually use it. If you don&#8217;t have a rua address in your DMARC record, or you have one but the reports go to an inbox nobody reads, that&#8217;s the first thing to fix. DMARC reports are how you see what&#8217;s actually happening with your mail today: which of your senders are aligning, which are failing, and which IPs are sending in your name without your knowledge. Once DKIM2 verification rolls out, those same reports will start carrying DKIM2 results too, and the value of that new signal depends entirely on whether you have the pipeline to read it. DKIM2 doesn&#8217;t replace DMARC. It feeds into it.<\/p>\n\n\n\n<p>Know your sending stack. List out every vendor that sends mail on your behalf: ESPs, CRM, transactional providers, support tools, marketing automation, internal apps. When DKIM2 starts factoring into deliverability, the implementation work happens at each of these vendors, not on your domain. The sooner you have that map, the easier the conversations get.<\/p>\n\n\n\n<p>Pay attention to what your ESPs and mail providers say about their DKIM2 roadmaps over the next year. The ones that take this seriously will be ready when the major mailbox providers start rewarding it. The ones that don&#8217;t, you&#8217;ll want to know about before they become your problem.<\/p>\n\n\n\n<p>That&#8217;s it. There isn&#8217;t a checklist with twenty items. Anyone telling you there is, isn&#8217;t being straight with you.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-my-take\"><strong>My take<\/strong><\/h2>\n\n\n\n<p>It&#8217;s been a while since <a href=\"https:\/\/easydmarc.com\/blog\/tools-to-automate-spf-dkim-dmarc-setup\/\">email authentication<\/a> has seen a real change. DKIM1 is from 2007. <a href=\"https:\/\/easydmarc.com\/blog\/understanding-spf-sender-policy-framework-to-improve-email-delivery\/\">SPF<\/a> in its current form has been around even longer. DMARC came along in 2015 and has stayed essentially the same since. For most of the last decade, the work in this space has been about getting people to actually deploy what already existed, not about new protocols.<\/p>\n\n\n\n<p>That&#8217;s about to change. DKIM2 is one shift. DMARCbis is the other. <a href=\"https:\/\/easydmarc.com\/blog\/what-is-dmarcbis\/\">DMARCbis<\/a> is the update to the original DMARC RFC, taking it from an &#8220;informational&#8221; document to a proper standards-track specification, and it cleans up a lot of the ambiguity that made the original RFC hard to implement consistently. It&#8217;s working its way through the IETF right now and is genuinely close to being finalized.<\/p>\n\n\n\n<p>Two real protocol updates landing in roughly the same window is a bigger deal than people are giving it credit for. The ecosystem has been static for so long that I think a lot of teams have stopped paying attention to the specs themselves and are running on whatever their tools and vendors hand them. That&#8217;s going to bite some of those teams over the next two years, because the assumptions baked into older deployments aren&#8217;t going to match what the new specs do.<\/p>\n\n\n\n<p>DKIM2 by itself doesn&#8217;t fix every email problem. It doesn&#8217;t replace DMARC, it doesn&#8217;t replace BIMI, and it isn&#8217;t going to be the last word on email authentication. But combined with DMARCbis, it&#8217;s the most meaningful update to the email auth stack in over a decade. Worth paying attention to.<\/p>\n\n\n\n<p>We&#8217;ll keep covering this on the EasyDMARC blog as the spec firms up, the implementations roll out, and the major mailbox providers publish their own guidance. If there&#8217;s a specific angle you&#8217;d like us to dig into, let us know.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our team was at a Deliverability Summit where &#8230;<\/p>\n","protected":false},"author":25,"featured_media":61033,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,287,203],"tags":[],"class_list":["post-61032","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-dkim","category-email-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DKIM2 Explained | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Learn what DKIM2 changes, how it addresses DKIM replay attacks, mailing list issues, and backscatter, and what senders should prepare for next.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DKIM2 Explained: What&#039;s Changing and What to Do\" \/>\n<meta property=\"og:description\" content=\"Learn what DKIM2 changes, how it addresses DKIM replay attacks, mailing list issues, and backscatter, and what senders should prepare for next.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-28T09:08:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T12:36:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2026\/04\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hagop K.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hagop K.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/\"},\"author\":{\"name\":\"Hagop K.\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/740e38b8d7f98e6c4141ae2931ca5a2a\"},\"headline\":\"DKIM2 Explained: What&#8217;s Changing and What to Do\",\"datePublished\":\"2026-04-28T09:08:55+00:00\",\"dateModified\":\"2026-04-28T12:36:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/\"},\"wordCount\":2133,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg\",\"articleSection\":[\"Blog\",\"DKIM\",\"Email Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/\",\"name\":\"DKIM2 Explained | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg\",\"datePublished\":\"2026-04-28T09:08:55+00:00\",\"dateModified\":\"2026-04-28T12:36:18+00:00\",\"description\":\"Learn what DKIM2 changes, how it addresses DKIM replay attacks, mailing list issues, and backscatter, and what senders should prepare for next.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg\",\"width\":1440,\"height\":910,\"caption\":\"image for DKIM2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/dkim2-explained-whats-changing-and-what-to-do\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DKIM2 Explained: What&#8217;s Changing and What to Do\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/740e38b8d7f98e6c4141ae2931ca5a2a\",\"name\":\"Hagop K.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb6e65e2ae3c6e57f798515a978995b899d1d972034c909397efad978249be85?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb6e65e2ae3c6e57f798515a978995b899d1d972034c909397efad978249be85?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/bb6e65e2ae3c6e57f798515a978995b899d1d972034c909397efad978249be85?s=96&r=g\",\"caption\":\"Hagop K.\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/hagopkhatchoian\\\/\"],\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/hagop-khatchoian\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DKIM2 Explained | EasyDMARC","description":"Learn what DKIM2 changes, how it addresses DKIM replay attacks, mailing list issues, and backscatter, and what senders should prepare for next.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/","og_locale":"en_US","og_type":"article","og_title":"DKIM2 Explained: What's Changing and What to Do","og_description":"Learn what DKIM2 changes, how it addresses DKIM replay attacks, mailing list issues, and backscatter, and what senders should prepare for next.","og_url":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2026-04-28T09:08:55+00:00","article_modified_time":"2026-04-28T12:36:18+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2026\/04\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg","type":"image\/jpeg"}],"author":"Hagop K.","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Hagop K.","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/"},"author":{"name":"Hagop K.","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/740e38b8d7f98e6c4141ae2931ca5a2a"},"headline":"DKIM2 Explained: What&#8217;s Changing and What to Do","datePublished":"2026-04-28T09:08:55+00:00","dateModified":"2026-04-28T12:36:18+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/"},"wordCount":2133,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2026\/04\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg","articleSection":["Blog","DKIM","Email Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/","url":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/","name":"DKIM2 Explained | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2026\/04\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg","datePublished":"2026-04-28T09:08:55+00:00","dateModified":"2026-04-28T12:36:18+00:00","description":"Learn what DKIM2 changes, how it addresses DKIM replay attacks, mailing list issues, and backscatter, and what senders should prepare for next.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2026\/04\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2026\/04\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg","width":1440,"height":910,"caption":"image for DKIM2"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/dkim2-explained-whats-changing-and-what-to-do\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"DKIM2 Explained: What&#8217;s Changing and What to Do"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/740e38b8d7f98e6c4141ae2931ca5a2a","name":"Hagop K.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bb6e65e2ae3c6e57f798515a978995b899d1d972034c909397efad978249be85?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bb6e65e2ae3c6e57f798515a978995b899d1d972034c909397efad978249be85?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bb6e65e2ae3c6e57f798515a978995b899d1d972034c909397efad978249be85?s=96&r=g","caption":"Hagop K."},"sameAs":["https:\/\/www.linkedin.com\/in\/hagopkhatchoian\/"],"url":"https:\/\/easydmarc.com\/blog\/author\/hagop-khatchoian\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2026\/04\/DKIM2-Explained_-Whats-Changing-and-What-to-Do.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/61032","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=61032"}],"version-history":[{"count":6,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/61032\/revisions"}],"predecessor-version":[{"id":61091,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/61032\/revisions\/61091"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/61033"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=61032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=61032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=61032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}