Cracking a 512-bit DKIM key for less than $8 in the cloud

Email and DKIM security context

  • Many argue email is still weaker than people assume; others counter that with TLS between MTAs plus DKIM/DMARC, it’s “good enough” for most users, with real failures often being passwords and account takeover.
  • Several participants stress that the real risk here is domain spoofing (spammers forging DKIM on your domain), not confidentiality of message content.
  • DKIM-512 is rare in the wild, but still present: roughly ~0.3% of observed DKIM keys in a 1M-domain sample, and likely higher on the broader internet.

RSA key sizes and factorization difficulty

  • Broad agreement: 512‑bit RSA is long broken and trivial to factor with today’s tools and commodity hardware.
  • Most say 1024‑bit RSA is on the edge: not broken publicly, but considered weak and being phased out; attackers with nation-state resources might manage it.
  • Disagreement and confusion over scaling:
    • Some claim GNFS cost grows roughly with the square of bit length and dramatically understate the cost of 1024/2048 factoring.
    • Others correct this, pointing to GNFS’s super‑polynomial behavior and giving cost estimates for 1024‑bit factoring in the tens of millions of dollars or more.
  • Consensus: 2048‑bit RSA is currently safe against classical attacks; long‑term future belongs to non‑RSA schemes and post‑quantum algorithms.

Migration, standards, and alternative algorithms

  • RFCs now deprecate <1024‑bit DKIM keys and require verifiers to handle at least 1024–4096 bits; reality lags but most large providers comply.
  • Ed25519 for DKIM is standardized and partially deployed, but ecosystem support (mail servers, big providers, DNS tooling) is uneven and slow.
  • Some argue for just using 4096‑bit RSA where possible; others see this as wasted effort vs. moving to elliptic curves or PQC.

Operational and DNS constraints

  • Practical blockers mentioned:
    • DNS TXT record limits (255 bytes per string; multi‑string records are allowed but poorly supported in some UIs/registrars).
    • Some DNS providers still cap DKIM keys at 1024 bits or don’t handle split TXT records well, especially in smaller or non‑US markets.
  • Tooling for key rotation and management is described as underdeveloped and brittle, so many orgs leave old or weak keys in place for years.

Deniability, privacy, and DKIM

  • A substantial subthread debates whether strong, long‑lived DKIM signatures are a privacy problem:
    • One side: they enable stolen mail spools to be cryptographically authenticated years later, aiding blackmail, leaks, and legal exposure, while offering little value to end users.
    • Proposed mitigation: regularly rotate DKIM keys and later publish old private keys to restore repudiation (anyone could have forged those signatures).
    • Others counter that non‑repudiation can be socially useful (evidence in disputes, courts, journalism) and that users often want verifiability, not deniability.
  • Clarified: DKIM authenticates a sending domain/MTA, not an individual human; courts and non‑experts may nonetheless over‑interpret its evidentiary value.

Ethics and legality of cracking live keys

  • Some are uneasy about factoring real, in‑use DKIM keys, seeing it as crossing an ethical or even legal line (akin to cloning a physical key).
  • Others respond that:
    • The work used only public data and did not send fraudulent mail; it’s comparable to demonstrating exploitability in typical security research.
    • Responsible disclosure and fixing the issue before publication makes it ethically acceptable.
  • No clear consensus; participants note jurisdiction‑dependent laws and the practical risk that upset companies might still seek prosecution.