Linux - EnterpriseThis forum is for all items relating to using Linux in the Enterprise.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
...Technically, a given port being "open" (in this context, reachable) is not enough for a communication channel to be established. There needs to be an application (service) listening on that port, accepting the incoming packets and processing them. If there is no application listening on a port, incoming packets to that port will simply be rejected by the computer's operating system.
Here is a link and the info from that link that may help you a little more with port 80. They talk about two things here that don't apply to your question, their firewall test and Microsoft. Just ignore that part ;-)
TCP Port 80 may use a defined protocol to communicate depending on the application. A protocol is a set of formalized rules that explains how data is communicated over a network. Think of it as the language spoken between computers to help them communicate more efficiently.
Protocol HTTP for example defines the format for communication between internet browsers and web sites. Another example is the IMAP protocol that defines the communication between IMAP email servers and clients or finally, the SSL protocol which states the format to use for encrypted communications.
TCP Port 80
Here is what we know about protocol TCP Port 80. If you have information on TCP port 80 that is not reflected on this page, simply leave a comment and we’ll update our information.
PORT 80 is the default port used by Hypertext Transfer Protocol. When you visit a website, it serves your browser information over port 80. Unfortunately, because it’s so popular, it is also used by a number of viruses.
If you scanned your computer with our free firewall test and see that port 80 is open, and you have not set an application to use and listen on that port, then you may have a virus. What you need to do open your browser, type in your ip address and see what pops up? You can also install this free tool from Microsoft to check for open ports.
PORT 80 – More Information
Port Number: 80
TCP / UDP: TCP
Delivery: Yes
Protocol / Name: [Malware known as WebServerCT]
Port Description: [malware info: Web Server CT]
Virus / Trojan: Yes, Caution!
Use our free Digital Footprint and Firewall Test to help verify you are not infected.
Side note: TCP port 80 uses the Transmission Control Protocol. TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered on port 80 in the same order in which they were sent. Guaranteed communication over port 80 is the key difference between TCP and UDP. UDP port 80 would not have guaranteed communication in the same way as TCP.
Because protocol TCP port 80 was flagged as a virus (colored red) does not mean that a virus is using port 80, but that a Trojan or Virus has used this port in the past to communicate.
Just in case you're still struggling, a few quick questions / suggestions:
* You mention the port, but not the protocol. I trust this is TCP. If UDP (or anything else), telnet won't connect to it
* Have you tried this test from the SAME machine, to eliminate the possibility of a problem on the other machine, or between them?
* Any TCP wrappers at play?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.