Nigeria Internet Registration Association (NiRA)

  • banner1.png
  • banner2.jpg
  • banner3.png

Why an email may not get delivered

The average person checks their mailbox every fifteen times in a day.

For most if not all, the first thing we do at work, is to check our mailbox and it is the last thing we do at close of work. It could be a frustrating day when our mail don’t get sent or delivered or we don’t receive the mail sent to us.

There are several reasons why an email may never get delivered to a mailbox. When an email is sent and a failed delivery message is received, several reasons can be attributed to this situation.

These can be:

  • Mailbox is over its allocated quota
  • The mail server being unresponsive
  • Virus was attached to message and virus scanner redirected the email
  • Authentication issues (the most common).
  • Network issues.
  • Blocked IP addresses (Customers IP address may be blacklisted).
  • SpamAssassin settings too strict (email spam filter).
  • Spammer (or more likely a compromised email account)
  • Misconfigured settings

When an email is sent, there are only two possible outcomes; either the email gets delivered or it bounces back with an error. There is no in-between and mail doesn't just "disappear into limbo" as many people believe.

A bounce error is also called a Non-Delivery Report/Receipt (NDR), a (failed) Delivery Status Notification (DSN) message, a Non-Delivery Notification (NDN) and is an automated electronic mail message from the mail server informing the sender about a delivery problem. There are two types of errors. Temporary errors are known as soft-bounce errors and permanent delivery errors and are known as hard-bounce errors. Temporary errors will usually be re-delivered, while permanent errors will be returned or bounced.

That being said, the most common cause is usually the user error in setting up the email on their mail client. Their mail client could be Outlook, Thunderbird, Eudora, etc. It is advised that users should check the configuration settings.

Should you face challenges with your mailbox, call in the experts in your organization to assist to resolve the problem.


Nigeria Internet Registration Association (NiRA) was at the 6th General Meeting of the National Council on Communication Technology (NCCT) which held at the June 12 Cultural Centre Kuto, Abeokuta, Ogun from the 18th to 23rd of November, 2018. The theme of this 6th General Meeting of the NCCT was “Leveraging ICT as a Veritable Vehicle for National Economic Recovery and Growth”. NiRA provided a consultative desk at the meeting for government officials from the Local & State Governments to check their .ng domain names and their details.

The 6th General Meeting of the NCCCT was well attended by stakeholders in the Communications industry. There were representatives from the Nigeria Communications Commission (NCC), National Information Technology Development Agency (NITDA), Galaxy Backbone PLC, Nigeria Postal Services (NIPOST), Nigeria Communication Satellite (NIGCOMSAT) and representatives from each State of the Federal Republic of Nigeria. 

The experts gathered at the meeting to discuss and advise the Council on how ICT could be leveraged on to support government strategies for economic recovery and growth.

The NCCT meeting enhances national intergovernmental coordination in the ICT sector and provides platform for networking and experience sharing toward harmonized sector development.

Barrister Adebayo Shittu, the Minister of Communications during his speech, said that the Federal Government is committed to the use of Information Communication Technology (ICT) as a means of diversifying the economy.

This, he explained, will help in the nation’s economic recovery and massive employment generation for the teeming youth

Gov. Senator Ibikunle Amosun, the Ogun State Governor declared open the 6th General Meeting of the NCCT and charged the ICT stakeholders to look vividly into how best they can control the misuse of the social media and turn it into a means of mass development. He also urged the council to come up with a control mechanism to checkmate and curb illegal usage of social media platforms.

 Read More:

.NG Domain Report for September, October and November 2018

Implementation of Policies in the AFRINIC Service Region

African Network Information Centre (AFRINIC), the Regional Internet Registry (RIR) for the African Region responsible for the allocation and management of Internet Numbers, published on its website on the 29th November 2018, the news on the implementation of some policies. The two fully implemented policies are the IPv6 Policy and references Update and the IPv6 Initial Allocation Update.

AFRINIC also announced the partly implemented policies on “Lame Delegations in the AFRINIC Reverse DNS” and the “IPv6 PI Update”.

The “Lame Delegations in the AFRINIC Reverse DNS” requires that lame name servers be deleted from the WHOIS database. At the moment, all identified lame name servers are relayed to the contacts of the concerned objects, without any action being taken from AFRINIC. This would be fully implemented in Q1 2019.

The Consolidated Policy Manual (CPM) had been updated to version 1.3 to include the above implemented policies.

AFRINIC has requested that its community and members can contact This email address is being protected from spambots. You need JavaScript enabled to view it. for comments or feedback.

ICANN - Contractual Compliance: Addressing Domain Name System (DNS) Infrastructure Abuse

The Internet Corporation for Assigned Names and Numbers (ICANN) has released two new circulars, namely on increasing transparency around compliance activities and Domain Name System (DNS) infrastructure abuse.

The Contractual Compliance Monthly Dashboard now includes more information regarding registrar-related DNS abuse report handling complaints, including reports regarding spam, pharming, phishing, malware and botnets. It also includes information on counterfeiting, online pharmaceutical concerns, fraudulent and deceptive practices, trademark or copyright infringement and complaints regarding registrar abuse contacts.

The second initiative, addressing DNS infrastructure abuse, is as a result of the concerns raised by large sections of the community about the prevalence of this abuse. They had questioned the willingness and ability of ICANN and contracted parties to address the matter. For example, the Competition, Consumer Choice and Consumer Trust Review Team’s final report includes a lengthy chapter on DNS infrastructure abuse and includes several related recommendations. The Governmental Advisory Committee (GAC) also raised concerns about DNS infrastructure abuse in the Copenhagen Communiqué, and elsewhere.

In Contractual Compliance, ICANN stated that the audits are  conducted with specific focus on the DNS infrastructure abuse. They have broadened the scope of questions and testing in their registrar and registry audits, focusing on process, procedures, and handling of DNS infrastructure abuse. The revised audit testing focuses on reviewing security threat reports for completeness and comparing them against publicly available reports.

In the March 2018 Registry Audit conducted on 20 generic top-level domains (gTLDs), ICANN had included the expanded audit questions. Through that audit, certain actions that registries and registrars had undertaken to address DNS infrastructure abuse, were identified. They include conducting security threat analyses frequently and retaining reports for future reference. These reports identified abusive domains that were also identified in publicly available abuse reports (e.g., MalwarePatrol, PhishTank, Spamhaus and SURBL), and included evidence of actions taken against abusive domains. The audit also showed that there were incomplete analyses and security reports for 13 top-level domains (TLDs), as well as a lack of standardized or documented abuse handling procedures and no action being taken on identified threats.

ICANN has also launched an audit focused on DNS infrastructure abuse for nearly 1200 gTLDs, and held two audit webinars with the registries to address questions and concerns. Some of these concerns were also raised in a recent email from the Registries Stakeholder Group (RySG) and addressed by Contractual Compliance.

ICANN’s mission is to maintain the security and stability of the DNS. Consistent with this mission, ICANN Contractual Compliance is now addressing DNS infrastructure abuse by conducting registry and registrar audits. The purpose of these audits ensures that the contracted parties uphold their contractual obligations with respect to DNS infrastructure abuse and security threats. Upon completion of the audits, ICANN Contractual Compliance will publish their findings and observations, including examples of strategies and processes to mitigate DNS infrastructure abuse.

For audit-related questions, please contact ICANN Contractual Compliance at This email address is being protected from spambots. You need JavaScript enabled to view it..