Could someone give me a hint on what security it buys to do a chroot before servicing a request from a network daemon? I guess it depends on what the attacker is able to find in the chrooted environment, if he can import programs, ... Also, if it is not too off-topic, what would be the best way to allow syslogs after a chroot, if the syslog daemon uses unix datagram sockets, that dont survive the chroot call? Thank you, Marc.