No. Once that has been applied (assuming the executable is in that spot anyway, change the path to match yours) and the binary is owned by root, Xastir will change the effective user ID to "root" at the point it needs to open a port, then will go back to the user you started Xastir from immediately after, so it's reasonably safe security-wise.
What it will do is tell you whether there's a permission issue or user/group ownership issue with that port. Xastir should be able to open the port in that instance. On Mon, Feb 8, 2021 at 1:06 PM Eric Chamberlain <ericchamberl...@mail.com> wrote: > > Curt, are you asking if I'm able to execute the /usr/local/bin/xastir when > 4755 has been applied? > _______________________________________________ > Xastir mailing list > Xastir@lists.xastir.org > http://xastir.org/mailman/listinfo/xastir -- Curt, WE7U http://xastir.org http://www.sarguydigital.com _______________________________________________ Xastir mailing list Xastir@lists.xastir.org http://xastir.org/mailman/listinfo/xastir