5.1 Security Considerations for Implementers

This protocol uses the SHA-1 hashing algorithm, which has been shown to have weaknesses [FIPS180]. However, the protocol is not intended for use in applications that demand robust security without Internet Protocol security (IPsec) or other lower-level security mechanisms already in place.