How to Install and Uninstall knock Package on openSUSE Leap
Last updated: November 23,2024
1. Install "knock" package
In this section, we are going to explain the necessary steps to install knock on openSUSE Leap
$
sudo zypper refresh
Copied
$
sudo zypper install
knock
Copied
2. Uninstall "knock" package
This guide covers the steps necessary to uninstall knock on openSUSE Leap:
$
sudo zypper remove
knock
Copied
3. Information about the knock package on openSUSE Leap
Information for package knock:
------------------------------
Repository : Main Repository
Name : knock
Version : 0.8-bp155.2.11
Arch : x86_64
Vendor : openSUSE
Installed Size : 15.3 KiB
Installed : No
Status : not installed
Source package : knock-0.8-bp155.2.11.src
Upstream URL : http://www.zeroflux.org/knock/
Summary : A Port-Knocking Client
Description :
The server part (package knockd) listens to all traffic on an ethernet
(or PPP) interface, looking for special "knock" sequences of port hits.
This client makes these port hits by sending a TCP (or UDP) packet to a
port on the server. This port does not need to be open. Since knockd
listens at the link-layer level, it sees all traffic even if it is
destined for a closed port. When the server detects a specific sequence
of port hits, it runs a command defined in its configuration file. This
can be used to open up holes in a firewall for quick access.
------------------------------
Repository : Main Repository
Name : knock
Version : 0.8-bp155.2.11
Arch : x86_64
Vendor : openSUSE
Installed Size : 15.3 KiB
Installed : No
Status : not installed
Source package : knock-0.8-bp155.2.11.src
Upstream URL : http://www.zeroflux.org/knock/
Summary : A Port-Knocking Client
Description :
The server part (package knockd) listens to all traffic on an ethernet
(or PPP) interface, looking for special "knock" sequences of port hits.
This client makes these port hits by sending a TCP (or UDP) packet to a
port on the server. This port does not need to be open. Since knockd
listens at the link-layer level, it sees all traffic even if it is
destined for a closed port. When the server detects a specific sequence
of port hits, it runs a command defined in its configuration file. This
can be used to open up holes in a firewall for quick access.