Hi guys, I'm using Tomoyo 1.8.3 on linux 3.1, migrating from in-kernel Tomoyo 2.4, I have started using socket filtering which is pretty cool! I have found that Tomoyo generates logs like this: "network inet dgram send X.X.X.X 0" connection attempts on UDP port 0, for every outbound inet TCP connection the program makes. Is sending to UDP 0 still how the OS finds a free port? Even if I do not authorize these packets through in the policy, everything seems to work fine. Is this a known behaviour? Would you recommend allowing this activity? Could it not be misused to communicate externally on port 0? Cheers & Best wishes! Milton