dm.8.in 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107
  1. .\" $NetBSD: dm.8,v 1.9 2003/08/07 09:37:11 agc Exp $
  2. .\"
  3. .\" Copyright (c) 1987, 1991, 1993
  4. .\" The Regents of the University of California. All rights reserved.
  5. .\"
  6. .\" Redistribution and use in source and binary forms, with or without
  7. .\" modification, are permitted provided that the following conditions
  8. .\" are met:
  9. .\" 1. Redistributions of source code must retain the above copyright
  10. .\" notice, this list of conditions and the following disclaimer.
  11. .\" 2. Redistributions in binary form must reproduce the above copyright
  12. .\" notice, this list of conditions and the following disclaimer in the
  13. .\" documentation and/or other materials provided with the distribution.
  14. .\" 3. Neither the name of the University nor the names of its contributors
  15. .\" may be used to endorse or promote products derived from this software
  16. .\" without specific prior written permission.
  17. .\"
  18. .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
  19. .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
  20. .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
  21. .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  22. .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
  23. .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
  24. .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  25. .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
  26. .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
  27. .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
  28. .\" SUCH DAMAGE.
  29. .\"
  30. .\" @(#)dm.8 8.1 (Berkeley) 5/31/93
  31. .\"
  32. .Dd May 31, 1993
  33. .Dt DM 8
  34. .Os
  35. .Sh NAME
  36. .Nm dm
  37. .Nd dungeon master
  38. .Sh SYNOPSIS
  39. .Nm ln
  40. .Fl s Cm dm Ar game
  41. .Sh DESCRIPTION
  42. .Nm
  43. is a program used to regulate game playing.
  44. .Nm
  45. expects to be invoked with the name of a game that a user wishes to play.
  46. This is done by creating symbolic links to
  47. .Nm ,
  48. in the directory
  49. .Pa @gamesdir@
  50. for all of the regulated games.
  51. The actual binaries for these games should be placed in a
  52. .Dq hidden
  53. directory,
  54. .Pa @libexecdir@ ,
  55. that may only be accessed by the
  56. .Nm
  57. program.
  58. .Nm
  59. determines if the requested game is available and, if so, runs it.
  60. The file
  61. .Pa @dm_configfile@
  62. controls the conditions under which games may be run.
  63. .Pp
  64. The file
  65. .Pa @dm_nogamesfile@
  66. may be used to
  67. .Dq turn off
  68. game playing.
  69. If the file exists, no game playing is allowed; the contents of the file
  70. will be displayed to any user requesting a game.
  71. .Sh FILES
  72. .Bl -tag -width @dm_logfile@ -compact
  73. .It Pa @dm_configfile@
  74. configuration file
  75. .It Pa @dm_nogamesfile@
  76. turns off game playing
  77. .It Pa @libexecdir@
  78. directory of ``real'' binaries
  79. .It Pa @dm_logfile@
  80. game logging file
  81. .El
  82. .Sh SEE ALSO
  83. .Xr dm.conf 5
  84. .Sh HISTORY
  85. The
  86. .Nm
  87. command appeared in
  88. .Bx 4.3 tahoe .
  89. .Sh SECURITY CONSIDERATIONS
  90. Two issues result from
  91. .Nm
  92. running the games setgid
  93. .Dq games .
  94. First, all games that allow users to run
  95. .Ux
  96. commands should carefully
  97. set both the real and effective group ids immediately before executing
  98. those commands.
  99. Probably more important is that
  100. .Nm
  101. never be setgid anything but
  102. .Dq games
  103. so that compromising a game will result only in
  104. the user's ability to play games at will.
  105. Secondly, games which previously had no reason to run setgid and which
  106. accessed user files may have to be modified.