Mailpolicy Baloise Group
You have sent us an email that was rejected by our IT protection mechanisms. Please first view the error message you received for further information. When necessary, please ask your email provider for further assistance.
In order to protect its users and systems, the Baloise Group reserves the right to temporarily or permanently reject emails if they do not meet the guidelines of the Baloise Group or common standards.
- The senders of emails must respect the legal requirements in their respective countries, provided these do not conflict with the provisions set forth herein. For senders based in the United States of America, primarily compliance with the «CAN SPAM act» is mandatory.
- Senders must adhere to the technical standards defined in RFC 5321 and RFC 5322.
- The delivering server must have a static IP address. This must also be correctly configured. This applies in particular to the correct reverse DNS entry for the IP ad-dress used.
- Emails containing malicious, immoral or illegal content will be rejected. This applies in particular to
- emails identified as SPAM
- emails infected with viruses or trojans, as well as those that provide links to infected web pages
- emails with content that encourages sedition, instructs people to carry out criminal acts or glorifies violence, or emails that reference websites with such con-tent,
- emails that aim to illegally obtain the login credentials of the recipient.
- The Baloise Group reserves the right to make use of external lists, such as IP lists (RBL lists) or hash lists in order to sort and reject emails.
- In addition, the Baloise Group reserves the right to temporarily or permanently block emails from senders who violate this email policy, and to initiate legal proceed-ings to combat statutory violations.
Do you need some help?
If you have problems sending emails to Baloise, please contact our postmaster.
|Error message||Email subject|
|Incorrect Helo Name||
5.7.1 <localhost>: Helo command rejected: You are not me. For further assistance, please visit http://www.baloise.com/mailpolicy
|Sender address rejected||
5.1.8 Sender address rejected: Domain not found. For further assistance, please visit http://www.baloise.com/mailpolicy
|Bad sender address syntax||
5.1.7 Bad sender address syntax. For further assistance, please visit http://www.baloise.com/mailpolicy
5.1.1 Recipient address rejected: User unknown in relay recipient table. For further assistance, please visit http://www.baloise.com/mailpolicy
5.7.0 Reject, id=32261-01 - BANNED: application/octet-stream,.exe,.exe-ms,write.exe. For further assistance, please visit http://www.baloise.com/mailpolicy
5.7.0 Reject, id=11211-09 - INFECTED: Heuristics.OLE2.ContainsMacros. For further assistance, visit http://www.baloise.com/mailpolicy
Description: We reserve the right to reject mails with office documents which include macros.
5.7.0 Reject, id=28297-01 - INFECTED with Virus: Eicar-Test-Signature. For further assistance, please visit http://www.baloise.com/mailpolicy
5.7.0 Reject, id=32256-01 - SPAM Mail. For further assistance, please visit http://www.baloise.com/mailpolicy
|Blocked by Spamhaus||
5.7.1 Service unavailable http://www.spamhaus.org/query/bl?ip=22.214.171.124 . For further assistance, please visit http://www.baloise.com/mailpolicy
|Relay access denied||
4.7.1 <email@example.com>: Relay access denied. For further assistance, please visit http://www.baloise.com/mailpolicy
Email header / Email body
The email header contains technical information about an email's transmission route. Usually, email headers are not displayed in most email programs and webmail clients.
In contrast, the body of an email (the actual text) is displayed by default. This may consist simply of text or of several elements, such as text and attachments.
IP address (dynamic/static)
Abbreviation for Internet Protocol address. An IP address consists of a numeric code containing four figures from 0 to 255 (e. g. 126.96.36.199). Newer IP addresses (IPv6) are significantly longer and consist of digits and the letters a-f, which are separated from each other by a colon (e.g. 2001:8a2e:0370:0db8:85a3:7344:08d3:1319). This is the numeric address of a specific computer on the Internet. The IP address can be used to unambiguously identify a computer on the network.
In order to enable end users to avoid having to deal with complex numeric sequences, there is something called the Domain Name System, which converts IP addresses into alphanumeric identifiers. This can be used, for example, to convert the IP address 188.8.131.52 into the Baloise Group.
As an infinite number of IP addresses is not available, private ports are usually allocated dynamic IP addresses. If the connection to a dynamic IP address is interrupted, the next available number is assigned when the connection is re-established.
In contrast, static IP addresses are mainly used for computers that provide services on the Internet and which should always be accessible at the same IP address (e.g. Baloise).
Mailer daemons are the error messages that are sent from an email server to the original sender if an email is undeliverable. Other terms used for this are Bounce or Bounce Message and Delivery Status Notification (DSN).
Phishing emails attempt to obtain personal data from users. In general, users are asked to disclose access details for email accounts, information about credit cards or access data and transaction numbers for bank accounts. The phisher creates fake emails that give the impression of being from a trustworthy company.
A proxy server provides an interface to a computer network. Such a proxy server ensures that all the computers connected in a network can communicate with the outside world. Mobile operators also frequently use proxy servers to control Internet communications from mobile devices.
RBL list (Realtime Blackhole List)
IP addresses are gathered in an RBL list. Such lists can be used before establishing a connection in order to decide whether certain senders may submit emails to the recipient system or with which level of spam probability such emails are to be marked. There are several types of such lists. Some list IP addresses from which the owner of the list does not want emails to be sent or from which the owner does not want to receive emails. Other lists contain IP addresses that are known to be responsible for the transmission of email spam.
A relay is a mail server that accepts and forwards email from other mail servers using specific criteria. An SMTP relay server that is configured in an insecure way is an open mail relay that also forwards emails for which it is not respon-sible.
Scams refer to a special kind of email spam. Recipients are tricked into believing they could win a large sum of money or be part of a very good financial deal. This usually involves the email recipient having to make an up-front payment and then failing to obtain the promised outcome.
Spam is the term used for unsolicited email advertising. In technical terms, spam is usually separated into Unsolicited Commercial Email (UCE), which is spam with a commercial background, and Unsolicited Bulk Email (UBE), which cover other mass emails.