5.1 Security Considerations for Implementers

This protocol has similar security concerns as those described in [IETFDRAFT-ICENAT-19] section 18. Additional considerations and mitigations pertaining to this protocol are listed in this section.