There is an anti-spam law in place, but Frontier offers solutions to you directly.
All our customers have Frontier Anti-Spam at no extra cost. Anti-Spam gives you the opportunity to determine the level of spam detection you wish to apply to your Frontier, FrontierNet, Citlink/CTAZ, Newnorth, Epix, or GVNI email account.
Your can use the Frontier Account Editor* to adjust your Anti-Spam option.
For Frontier High-Speed Internet customers, we offer Frontier Internet Security, a security suite that features anti-spam and anti-spyware. Find out more about Frontier Secure® products and services. Security software must be downloaded using your Frontier High-Speed Internet service and requires XP Home/Professional (32-bit only, SP2 or later), Vista (32 or 64-bit), or Windows 7 (32 or 64-bit).
Note: If someone you know can't get an email through to you because the Frontier Anti-Spam system thinks that the message is spam:
- Be sure that your friend has his or her own email address entered correctly within the properties of their mail program. Our mail servers will automatically reject incomplete or bad email addresses.
- Have the sender of the email check with their Mail Administrator or Technical Support group to see if they can determine why the email is being rejected. Many times, the sender's mail system can be the source of the problem.
- If your Frontier Anti-Spam option is set to Aggressive, change it to Moderate.
If none of the solutions mentioned above solve your problem, please contact us and provide:
- The date of occurrence
- The sending and receiving email addresses
* You must be on the Frontier network in order to access the Frontier Account Editor. If you are in a hotel or at the office, you may not be able to access the Frontier Account Editor.
Frontier automatically scans your email for viruses using the latest software. There is no charge for this service.
If you receive an email containing a virus, the email will be returned to the sender along with a "bounce" message containing the following information:
- The fact that a virus has been found.
- The name of the virus.
- Advice on what to do about the virus.
- That the message in question will not be delivered to the intended recipient.
If the message contains a virus that is known to fake or forge the return email address, the message will not be returned to the sender; it will be deleted from our servers.
Frontier restricts and blocks known ports that in the past have allowed for the transfer of spam, viruses, and other malware. The ports are:
25, 135, 137, 138, 139, 445, and 1025
Port 25 restriction will take place on all dynamically assigned blocks, which would include Business Class High-Speed Internet customers when they are using dial-up access.
Blocking on TCP/UDP ports 135, 137, 138, 139, 445, and 1025 has been implemented for Residential and Business Dial-up customers, and Residential High-Speed Internet customers. Business Class High-Speed Internet customers will not be affected by TCP/UDP blocking unless they are using dial-up access.
No blocks will be placed on Business Class High-Speed Internet, Symmetric High-Speed Internet and FrontierNet Direct (T1 or larger) customers.
Below is an explanation of TCP and UDP ports.
TCP and UDP ports allow specific communications between computers, applications and programs.
A port is how a program, computer, application communicates with each other using TCP or UDP.
The ports are broken down into three categories:
- Well Known Ports: Range from 0 through 1023 and are assigned by the IANA (Internet Assigned Number Authority). These are the most commonly used ports.
- Registered Ports: Range from 1024 through 49151 and are listed by the IANA. These ports can be used through normal user processes or executable programs on most computers.
- Dynamic and/or Private Ports: Range from 49152 through 65535.
For a complete list of all the TCP/UDP ports please visit Iana Port numbers.
Why do we do this?
- To protect our customers: We can protect against certain common worms and from dangerous services on our customers' computers that could allow intruders to gain access.
- To protect our upstream bandwidth: If customers overuse their upstream bandwidth by running high-traffic servers or becoming infected with a worm or virus, it can degrade the service of other customers on that node.
- To protect the rest of the Internet: Some blocks prevent our customers from attacking other computers on the Internet. In addition to being in our best interest for protecting our bandwidth, it is our responsibility to prevent abuse of our network.
Below is a table showing common applications that use the ports that will be restricted or blocked.
|25 (only restricted, not blocked)||smtp (Simple Mail Transfer Protocol)||TCP||SMTP is the protocol used to shuttle email across the Internet from one mail server to another. Over its years of use, the protocol has evolved significantly to become much more capable, and much less "simple" than it was in the beginning.|
|135 (blocked)||dcom-scm (DCOM Service Control Manager)||TCP/UDP||Microsoft's DCOM (Distributed, i.e. networked, COM) Service Control Manager (also known as the RPC Endpoint Mapper) uses this port in a manner similar to SUN's UNIX use of port 111. The SCM server running on the user's computer opens port 135 and listens for incoming requests from clients wishing to locate the ports where DCOM services can be found on that machine.|
|137 (blocked)||netbios-ns (NetBIOS Name Service)||TCP/UDP||UDP NetBIOS name query packets are sent to this port, usually of Windows machines but also of any other system running Samba (SMB), to ask the receiving machine to disclose and return its current set of NetBIOS names.|
|138 (blocked)||netbios-dgm (NETBIOS Datagram Service||UDP||UDP NetBIOS datagrams packets are exchanged over this port, usually with Windows machines but also with any other system running Samba (SMB). These UDP NetBIOS datagrams support non-connection oriented file sharing activities.|
|139 (blocked)||netbios-ssn (NETBIOS Session Service)||TCP||TCP NetBIOS connections are made over this port, usually with Windows machines but also with any other system running Samba (SMB). These TCP connections form "NetBIOS sessions" to support connection oriented file sharing activities.|
|445 (blocked)||microsoft-ds (Microsoft Directory Services)||TCP/UDP||This port replaces the notorious Windows NetBIOS trio (ports 137–139), for all versions of Windows after NT, as the preferred port for carrying Windows file sharing and numerous other services.|
|1025 (blocked)||blackjack (network blackjack)||TCP||Microsoft operating systems tend to allocate one or more unsuspected, publicly exposed services among the first handful of ports immediately above the end of the service port range (1024+).|
As for that law, the "Controlling the Assault of Non-Solicited Pornography and Marketing" (CAN-SPAM) Act took effect in the United States in January, 2004. However, it does not make spam illegal, but rather places certain restrictions on what bulk mail senders can do. If spammers comply, they can send their unsolicited emails. The CAN-SPAM Act also does not apply to email sent from outside of the United States, even though other countries around the world have some measures in place.