The port nocking method is not security through obscurity. All authentication mechanisms are based on some private information: a public key, a password, ... You can think of the port nocking sequence as part of this private information.
Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds