4.3BSD-Tahoe/usr/man/cat8/dm.0

Compare this file to the similar file:
Show the results in this format:




DM(8)		    UNIX Programmer's Manual		    DM(8)



NNAAMMEE
     dm - dungeon master

SSYYNNOOPPSSIISS
     llnn --ss ddmm ggaammee

DDEESSCCRRIIPPTTIIOONN
     _D_m is a program used to regulate game playing.  _D_m expects
     to be invoked with the name of a game that a user wishes to
     play.  This is done by creating symbolic links to _d_m, in
     /_u_s_r/_g_a_m_e_s, for all of the regulated games.  The actual
     binaries for these games should be placed in a ``hidden''
     directory, /_u_s_r/_g_a_m_e_s/_h_i_d_e, that may only be accessed by the
     _d_m program.  _D_m determines if the requested game is avail-
     able and, if so, runs it.	The file /_u_s_r/_g_a_m_e_s/_d_m._c_o_n_f_i_g
     controls the conditions under which games may be run.  For
     remotely mounted file systems, a machine name may be
     appended to the config file name, i.e. the machine
     ``rip.berkeley.edu'' will use the file _d_m._c_o_n_f_i_g._r_i_p if it
     is present, otherwise it will use _d_m._c_o_n_f_i_g.

     The file /_u_s_r/_g_a_m_e_s/_n_o_g_a_m_e_s may be used to ``turn off'' game
     playing.  If the file exists, no game playing is allowed;
     the contents of the file will be displayed to any user
     requesting a game.

FFIILLEESS
     /usr/games/dm.config - configuration file
     /usr/games/hide	  - directory of ``real'' binaries
     /usr/games/nogames   - turns off game playing

SSEEEE AALLSSOO
     dm.config(5)

BBUUGGSS
     Two problems result from _d_m running the games setuid
     ``games''.  First, all games that allow users to run UNIX
     commands should carefully set both the real and effective
     user id's immediately before executing those commands.
     Probably more important is that _d_m never be setuid anything
     but ``games'' so that compromising a game will result only
     in the user's ability to play games at will.  Secondly,
     games which previously had no reason to run setuid and which
     accessed user files may have to be modified.











Printed 7/9/88		  July 9, 1988				1