How to Install and Uninstall knockd Package on openSUSE Leap
Last updated: November 07,2024
1. Install "knockd" package
Please follow the instructions below to install knockd on openSUSE Leap
$
sudo zypper refresh
Copied
$
sudo zypper install
knockd
Copied
2. Uninstall "knockd" package
This guide let you learn how to uninstall knockd on openSUSE Leap:
$
sudo zypper remove
knockd
Copied
3. Information about the knockd package on openSUSE Leap
Information for package knockd:
-------------------------------
Repository : Main Repository
Name : knockd
Version : 0.8-bp155.2.11
Arch : x86_64
Vendor : openSUSE
Installed Size : 75.0 KiB
Installed : No
Status : not installed
Source package : knock-0.8-bp155.2.11.src
Upstream URL : http://www.zeroflux.org/knock/
Summary : A port-knocking server
Description :
It listens to all traffic on an ethernet (or PPP) interface, looking
for special "knock" sequences of port-hits. A client (package knock)
makes these port-hits by sending a TCP (or UDP) packet to a port on the
server. This port need not be open -- since knockd listens at the
link-layer level, it sees all traffic even if it's destined for a
closed port. When the server detects a specific sequence of port-hits,
it runs a command defined in its configuration file. This can be used
to open up holes in a firewall for quick access.
-------------------------------
Repository : Main Repository
Name : knockd
Version : 0.8-bp155.2.11
Arch : x86_64
Vendor : openSUSE
Installed Size : 75.0 KiB
Installed : No
Status : not installed
Source package : knock-0.8-bp155.2.11.src
Upstream URL : http://www.zeroflux.org/knock/
Summary : A port-knocking server
Description :
It listens to all traffic on an ethernet (or PPP) interface, looking
for special "knock" sequences of port-hits. A client (package knock)
makes these port-hits by sending a TCP (or UDP) packet to a port on the
server. This port need not be open -- since knockd listens at the
link-layer level, it sees all traffic even if it's destined for a
closed port. When the server detects a specific sequence of port-hits,
it runs a command defined in its configuration file. This can be used
to open up holes in a firewall for quick access.