How to Install and Uninstall knockd Package on openSuSE Tumbleweed
Last updated: November 07,2024
1. Install "knockd" package
Please follow the steps below to install knockd on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
knockd
Copied
2. Uninstall "knockd" package
In this section, we are going to explain the necessary steps to uninstall knockd on openSuSE Tumbleweed:
$
sudo zypper remove
knockd
Copied
3. Information about the knockd package on openSuSE Tumbleweed
Information for package knockd:
-------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : knockd
Version : 0.8-2.10
Arch : x86_64
Vendor : openSUSE
Installed Size : 79.0 KiB
Installed : No
Status : not installed
Source package : knock-0.8-2.10.src
Upstream URL : http://www.zeroflux.org/knock/
Summary : A port-knocking server
Description :
It listens to all traffic on an ethernet (or PPP) interface, looking
for special "knock" sequences of port-hits. A client (package knock)
makes these port-hits by sending a TCP (or UDP) packet to a port on the
server. This port need not be open -- since knockd listens at the
link-layer level, it sees all traffic even if it's destined for a
closed port. When the server detects a specific sequence of port-hits,
it runs a command defined in its configuration file. This can be used
to open up holes in a firewall for quick access.
-------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : knockd
Version : 0.8-2.10
Arch : x86_64
Vendor : openSUSE
Installed Size : 79.0 KiB
Installed : No
Status : not installed
Source package : knock-0.8-2.10.src
Upstream URL : http://www.zeroflux.org/knock/
Summary : A port-knocking server
Description :
It listens to all traffic on an ethernet (or PPP) interface, looking
for special "knock" sequences of port-hits. A client (package knock)
makes these port-hits by sending a TCP (or UDP) packet to a port on the
server. This port need not be open -- since knockd listens at the
link-layer level, it sees all traffic even if it's destined for a
closed port. When the server detects a specific sequence of port-hits,
it runs a command defined in its configuration file. This can be used
to open up holes in a firewall for quick access.