This document is about L2 pseudowire path setup. There are no real security implications (beyond the normal "we pretend to do routing on layer 2 but not really" things that give me the willies), and the Security Considerations section here points to the appropriate security considerations sections in earlier RFCs. --Paul Hoffman