From owner-freebsd-amd64@FreeBSD.ORG Mon Aug 28 14:22:00 2006 Return-Path: X-Original-To: amd64@freebsd.org Delivered-To: freebsd-amd64@FreeBSD.ORG Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 9D4EC16A4DD for ; Mon, 28 Aug 2006 14:22:00 +0000 (UTC) (envelope-from lists@stringsutils.com) Received: from zoraida.natserv.net (p65-147.acedsl.com [66.114.65.147]) by mx1.FreeBSD.org (Postfix) with ESMTP id 3EFFA43D46 for ; Mon, 28 Aug 2006 14:22:00 +0000 (GMT) (envelope-from lists@stringsutils.com) Received: from zoraida.natserv.net (localhost.natserv.net [127.0.0.1]) by zoraida.natserv.net (Postfix) with ESMTP id 7C250B81F; Mon, 28 Aug 2006 10:21:56 -0400 (EDT) X-Spam-Checker-Version: SpamAssassin 3.1.3 (2006-06-01) on zoraida.natserv.net X-Spam-Level: X-Spam-Status: No, score=-2.6 required=4.0 tests=AWL,BAYES_00 autolearn=ham version=3.1.3 Received: from zoraida.natserv.net (zoraida.natserv.net [66.114.65.147]) by zoraida.natserv.net (Postfix) with ESMTP id 55CDDB81D; Mon, 28 Aug 2006 10:21:56 -0400 (EDT) References: <44F1CF17.9702.E990A11@dan.langille.org> Message-ID: X-Mailer: http://www.courier-mta.org/cone/ From: Francisco Reyes To: Dan Langille Date: Mon, 28 Aug 2006 10:21:56 -0400 Mime-Version: 1.0 Content-Type: text/plain; format=flowed; charset="US-ASCII" Content-Disposition: inline Content-Transfer-Encoding: 7bit X-Virus-Scanned: ClamAV using ClamSMTP Cc: amd64@freebsd.org Subject: Re: suggestions for SATA RAID cards X-BeenThere: freebsd-amd64@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Porting FreeBSD to the AMD64 platform List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 28 Aug 2006 14:22:00 -0000 Dan Langille writes: > I see how to specify the port, but not the IP address for the http > interface, so it appears only solution is firewalling it off. It's an option like "remote access". Once you select only connections from 127 are allowed in. If I recall correctly it is right above where you select the port. The port still listens on all interfaces, as reported by sockstat, but any attempts from outside 127.0.0.1 give an error right away.