Hi guys,

I'm using Tomoyo 1.8.3 on linux 3.1, migrating from in-kernel Tomoyo
2.4, I have started using socket filtering which is pretty cool!

I have found that Tomoyo generates logs like this:
"network inet dgram send X.X.X.X 0"
connection attempts on UDP port 0, for every outbound inet TCP
connection the program makes.

Is sending to UDP 0 still how the OS finds a free port?

Even if I do not authorize these packets through in the policy,
everything seems to work fine.

Is this a known behaviour?
Would you recommend allowing this activity?
Could it not be misused to communicate externally on port 0?

Cheers & Best wishes!
Milton

_______________________________________________
tomoyo-users-en mailing list
[email protected]
http://lists.sourceforge.jp/mailman/listinfo/tomoyo-users-en

Reply via email to