No. Once that has been applied (assuming the executable is in that
spot anyway, change the path to match yours) and the binary is owned
by root, Xastir will change the effective user ID to "root" at the
point it needs to open a port, then will go back to the user you
started Xastir from immediately after, so it's reasonably safe
security-wise.

What it will do is tell you whether there's a permission issue or
user/group ownership issue with that port. Xastir should be able to
open the port in that instance.

On Mon, Feb 8, 2021 at 1:06 PM Eric Chamberlain
<ericchamberl...@mail.com> wrote:
>
> Curt, are you asking if I'm able to execute the /usr/local/bin/xastir when 
> 4755 has been applied?
> _______________________________________________
> Xastir mailing list
> Xastir@lists.xastir.org
> http://xastir.org/mailman/listinfo/xastir



-- 
Curt, WE7U        http://xastir.org        http://www.sarguydigital.com
_______________________________________________
Xastir mailing list
Xastir@lists.xastir.org
http://xastir.org/mailman/listinfo/xastir

Reply via email to