Skip to main content

networking - Some confusion about listening and open ports, difference between listening, open and blocked


I have been strugling for some time now to open ports on some Linux machines and I have followed some tutorials, which I tried in 2 different Linux VMs and failed for either, and after some research I think I have found out why this is failing.


So, what did was to download gufw, set a rule to allow inbound connections to a specific port or disabled the firewall and rebooted. After that, when I scanned with zenmap I could see that the port was still closed.


But when I used nc -l -p port I could see that the port was open. The same thing happened on port 80 when the apache server was running for that machine.


Then, I configured the firewall to deny all inbound traffic and rebooted. I started the apache service and ran nc -l -p port and then scanned with zenmap and it said port 80 and the port chosen by nc were filtered


From this I draw the following conclusions:



  • Listening means that the port isn't protected by a firewall or the firewall allows inbound traffic to there and that there is a service listening on that port

  • Filtered means that there may be or may not be a service listening to that port but the firewall is denying inbound traffic

  • Closed means that the port isn't protected by the firewall and but there is no service/application listening on that port


So, opening a port means making it available to the outside if an application is listening. If it isn't, it will show as "closed" on nmap scans.


To sum up, if I want an application to be accessible to the outside, I have to bind it (is that the word?) to a port and then open that port on the firewall.


Is this correct? If you could add something to this I would appreciate it, I asked another question similar to this one but at the time I didn't know much about ports and firewalls, so if my conclusions are correct I can answer that question and hopefuly that will be helpful to someone.


Also, is it still possible to connect to a port in some way even if it isn't listening?



Answer



A port is just a concept for a connection between an application and a layer-4 protocol. There really isn't a "port" as such. When an application wants to receive traffic from a layer-4 protocol (TCP, UDP, etc.), it requests that the protocol send any layer-4 segments for that protocol which are addressed with a particular port number to the application.


When a layer-4 protocol has no application which has requested that layer-4 segments addressed to a particular port number, the port is Closed.


When an application has requested and been granted the use of a port number by a layer-4 protocol, the port is Open.


Firewalls can be set to drop layer-3 packets containing layer-4 segments for a particular layer-4 protocol addressed to a particular port. This means that the port is Filtered or Blocked on the firewall.


Each layer-4 protocol has its own ports, or it many not even use ports. For instance, one application can be receiving traffic for TCP 12345, and another application can be receiving traffic for UDP port 12345; they are not the same port because ports don't actually exist. The use of a particular port number on a particular layer-4 protocol is exclusive to the application granted use of the port by the layer-4 protocol.


Comments

Popular Posts

keyboard - Is there any utility/method to change Windows key bindings to type rare chars to currently empty bindings?

I'm currently typing this post with my windows XP machine and (Spanish) keyboard, and I'd like to add some extra symbols to my text. I could open the "char map" windows utility, look for the desired symbols, and paste them. But I'd like something quickier. For example, when I'm using my OSX Mac at work, I can easily add a ©, ™, ® or similar symbols, just pressing some weird ALT-GR + G / H / J, key combinations. In my (Spanish) keyboard mapping, these combinations are empty, as they don't produce any char at all, which, on the other hand, is perfectly normal and desirable. So, I thought: Why couldn't I add some extra key mappings on top of my currently empty ALT-GR + G/J/H Keys in my Spanish keyboard, and thus, being able to quickly type these special symbols? So that's my question: Is there any utility/method to achieve that effect under windows? (My version is XP). I've even googled this for some time but no luck. I've been a long term Hot...

virtualization - How to select paravirtualization interface in VirtualBox?

Given a windows 8 host system (Intel Core i5) and a Linux Fedora host, I would like to determine the optimal setting for the paravirtual interface. Options are none Default Legacy minimal Hyper-V KVM This page suggest the selection is only based on the guest system: The biggest change in VirtualBox 5.0 is the introduction of paravirtualization support, bringing higher performance and time-keeping accuracy to supported guest operating systems (Hyper-V on Windows and KVM on Linux). Is that correct? Answer The VirtualBox Manual , in the section titled Paravirtualization providers explains very clearly when each should be used (emphasis added): Minimal: Announces the presence of a virtualized environment. Additionally, reports the TSC and APIC frequency to the guest operating system. This provider is mandatory for running any Mac OS X guests. KVM: Presents a Linux KVM hypervisor interface which is recognized by Linux kernels starting with version 2.6.25. VirtualBox's implementati...

Desktop reboots itself on sleep or hibernate

I have been using an ASUS M2NPV-VM motherboard for main home desktop workstation, operating Windows Vista x64. This computer has right from day one not been able to enter hibernate or standby; after Windows performs its final actions and brings the machine down, it would automatically revive itself for a reboot. Updating to the second latest BIOS (1201)has not helped (the latest BIOS revision would induce video refresh problems rendering it unusable). I have been reading related discussions on incidents similar to mine to no avail of a true workable solution. They appear to be more speculative guesses rather than actual knowledge on the inner workings of motherboard hardware. Does anybody have any electronic engineering experience on PC energy-saving standards to provide a more informed opinion how to go about getting this to work? More stories: this motherboard could not even reboot properly the first thing i used it. It was due to refresh rate of the onboard GPU, which had no influe...

security - How is Linux not prone to viruses, malware and those kinds of things?

How is Linux protected against viruses? This question was a Super User Question of the Week . Read the blog entry for more details or contribute to the blog yourself Answer Well, it factually is not... it's just less subject to hackers developing viruses that target Linux systems. Consumer grade computers usually run on Windows and thus, when targeting a wide audience, Windows is the way to go. Don't misunderstand Linux and viruses, there definitely ARE Linux viruses. Some distros have additional protection layers such as SELinux (See here ) in Ubuntu for example. Then there's the default firewall and the fact that alien files don't automatically have permission to be executed. Specific execution permission has to be granted before execution is possible. (See here ) Then there are several other factors that make Linux a hard place to be for viruses usually non-root users on linux systems have no to little executable files at their disposal that would allow for virus...