How to Install and Uninstall knock Package on openSuSE Tumbleweed
Last updated: March 03,2025
1. Install "knock" package
This tutorial shows how to install knock on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
knock
Copied
2. Uninstall "knock" package
Please follow the instructions below to uninstall knock on openSuSE Tumbleweed:
$
sudo zypper remove
knock
Copied
3. Information about the knock package on openSuSE Tumbleweed
Information for package knock:
------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : knock
Version : 0.8-2.10
Arch : x86_64
Vendor : openSUSE
Installed Size : 19.2 KiB
Installed : No
Status : not installed
Source package : knock-0.8-2.10.src
Upstream URL : http://www.zeroflux.org/knock/
Summary : A Port-Knocking Client
Description :
The server part (package knockd) listens to all traffic on an ethernet
(or PPP) interface, looking for special "knock" sequences of port hits.
This client makes these port hits by sending a TCP (or UDP) packet to a
port on the server. This port does not need to be open. Since knockd
listens at the link-layer level, it sees all traffic even if it is
destined for a closed port. When the server detects a specific sequence
of port hits, it runs a command defined in its configuration file. This
can be used to open up holes in a firewall for quick access.
------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : knock
Version : 0.8-2.10
Arch : x86_64
Vendor : openSUSE
Installed Size : 19.2 KiB
Installed : No
Status : not installed
Source package : knock-0.8-2.10.src
Upstream URL : http://www.zeroflux.org/knock/
Summary : A Port-Knocking Client
Description :
The server part (package knockd) listens to all traffic on an ethernet
(or PPP) interface, looking for special "knock" sequences of port hits.
This client makes these port hits by sending a TCP (or UDP) packet to a
port on the server. This port does not need to be open. Since knockd
listens at the link-layer level, it sees all traffic even if it is
destined for a closed port. When the server detects a specific sequence
of port hits, it runs a command defined in its configuration file. This
can be used to open up holes in a firewall for quick access.