[MUD-Dev] Re: Player coding and security

clawrenc at cup.hp.com clawrenc at cup.hp.com
Wed May 21 15:34:40 New Zealand Standard Time 1997


In <33830715.41C67EA6 at iname.com>, on 05/21/97 
   at 08:30 AM, Shawn Halpenny <malachai at iname.com> said:

>There were a few posts a couple weeks back, most substantively from
>Chris Lawrence (I think), where inheritance was explored as a
>security model.  

Yup.  Dat's me.  Essentially I take Cool's per-object security model
(each object and method determines its own security criteria), and
provide APIs for easy testing of the inheritance tree of the
method-caller and message-source (who originated the event) as the
basis of determining validity of access.

>How many of us are looking to have some
>form of user-programming anyway?  

Me.

>And to what degree are things
>user-programmable, for that matter?

I don't impose limits in the server.  The DB may model various limits
and attempt to impose them on the rest of the DB.  As such I put
damned near nothing that is game-oriented in the server proper (ie the
server has no concept of containment, command parsing, placement, or
context).  Everything devolves to the DB.

--
J C Lawrence                           Internet: claw at null.net
(Contractor)                           Internet: coder at ibm.net
---------------(*)               Internet: clawrenc at cup.hp.com
...Honorary Member Clan McFUD -- Teamer's Avenging Monolith...




More information about the MUD-Dev mailing list