I've read the entire thread and I still have one persisting question in my mind...
Why are "bogus port exists" bad, and why should I eliminate them form my exit policy? *if* I want to keep the type of traffic somewhat also anonymous (assuming the operator is not looking at the content) then I might use a separate port to communicate my information. I don't know if I totally feel comfortable in this, most especially when we start talking about peering into the content. And even looking to see what the protocol actually is, is peering. That should be private, as an ethical consideration for all operators. Jon

