5.1 Security Considerations for Implementers

Security considerations for this protocol are covered in the preceding sections.