1 |
.\" Copyright (c) 1987, 1991, 1993 |
2 |
.\" The Regents of the University of California. All rights reserved. |
3 |
.\" |
4 |
.\" Redistribution and use in source and binary forms, with or without |
5 |
.\" modification, are permitted provided that the following conditions |
6 |
.\" are met: |
7 |
.\" 1. Redistributions of source code must retain the above copyright |
8 |
.\" notice, this list of conditions and the following disclaimer. |
9 |
.\" 2. Redistributions in binary form must reproduce the above copyright |
10 |
.\" notice, this list of conditions and the following disclaimer in the |
11 |
.\" documentation and/or other materials provided with the distribution. |
12 |
.\" 3. All advertising materials mentioning features or use of this software |
13 |
.\" must display the following acknowledgement: |
14 |
.\" This product includes software developed by the University of |
15 |
.\" California, Berkeley and its contributors. |
16 |
.\" 4. Neither the name of the University nor the names of its contributors |
17 |
.\" may be used to endorse or promote products derived from this software |
18 |
.\" without specific prior written permission. |
19 |
.\" |
20 |
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
21 |
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
22 |
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
23 |
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
24 |
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
25 |
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
26 |
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
27 |
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
28 |
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
29 |
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
30 |
.\" SUCH DAMAGE. |
31 |
.\" |
32 |
.\" @(#)dm.8 8.1 (Berkeley) 5/31/93 |
33 |
.\" $FreeBSD: src/games/dm/dm.8,v 1.3.2.1 2000/12/08 13:40:03 ru Exp $ |
34 |
.\" $DragonFly: src/games/dm/dm.8,v 1.4 2007/07/30 22:11:32 swildner Exp $ |
35 |
.\" |
36 |
.Dd May 31, 1993 |
37 |
.Dt DM 8 |
38 |
.Os |
39 |
.Sh NAME |
40 |
.Nm dm |
41 |
.Nd dungeon master |
42 |
.Sh SYNOPSIS |
43 |
.Nm ln |
44 |
.Fl s Cm dm Ar game |
45 |
.Sh DESCRIPTION |
46 |
.Nm Dm |
47 |
is a program used to regulate game playing. |
48 |
.Nm Dm |
49 |
expects to be invoked with the name of a game that a user wishes to play. |
50 |
This is done by creating symbolic links to |
51 |
.Nm , |
52 |
in the directory |
53 |
.Pa /usr/games |
54 |
for all of the regulated games. |
55 |
The actual binaries for these games should be placed in a |
56 |
.Dq hidden |
57 |
directory, |
58 |
.Pa /usr/games/hide , |
59 |
that may only be accessed by the |
60 |
.Nm |
61 |
program. |
62 |
.Nm Dm |
63 |
determines if the requested game is available and, if so, runs it. |
64 |
The file |
65 |
.Pa /etc/dm.conf |
66 |
controls the conditions under which games may |
67 |
be run. |
68 |
.Pp |
69 |
The file |
70 |
.Pa /etc/nogames |
71 |
may be used to |
72 |
.Dq turn off |
73 |
game playing. |
74 |
If the file exists, no game playing is allowed; the contents of the file |
75 |
will be displayed to any user requesting a game. |
76 |
.Sh FILES |
77 |
.Bl -tag -width /var/log/games.log -compact |
78 |
.It Pa /etc/dm.conf |
79 |
configuration file |
80 |
.It Pa /etc/nogames |
81 |
turns off game playing |
82 |
.It Pa /usr/games/hide |
83 |
directory of ``real'' binaries |
84 |
.It Pa /var/log/games.log |
85 |
game logging file |
86 |
.El |
87 |
.Sh SEE ALSO |
88 |
.Xr dm.conf 5 |
89 |
.Sh HISTORY |
90 |
The |
91 |
.Nm |
92 |
command appeared in |
93 |
.Bx 4.3 tahoe . |
94 |
.Sh BUGS |
95 |
Two problems result from |
96 |
.Nm |
97 |
running the games setuid |
98 |
.Dq games . |
99 |
First, all games that allow users to run |
100 |
.Ux |
101 |
commands should carefully |
102 |
set both the real and effective user id's immediately before executing |
103 |
those commands. Probably more important is that |
104 |
.Nm |
105 |
never be setuid |
106 |
anything but |
107 |
.Dq games |
108 |
so that compromising a game will result only in |
109 |
the user's ability to play games at will. Secondly, games which previously |
110 |
had no reason to run setuid and which accessed user files may have to |
111 |
be modified. |