5.1 Security Considerations for Implementers

There are no special security considerations for this protocol.