5.1 Security Considerations for Implementers
As specified in section 2.1, this protocol allows any user to connect to the server. Therefore, any security bug in the server implementation could be exploitable. It is recommended that the server implementation enforce security on each method.
There is only one security parameter, Authentication Protocol (section 2.1).