Hi All,

I have been using A2 for a few years now, but I've not really needed to
implement any deny/black-listing because I simply have no meaningful
security/traffic constraints. In moving forward with development on top of
A2 which does have security implications, I'm hoping it might be possible
that folks might be willing to share how they store blocked remote
addresses. For instance, are relational datastores and other such objects
typically required at the enterprise level to store blocked addresses? Or
is a plaintext file suitable from an efficiency standpoint?

Best,
Will F

Reply via email to