I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This document writes out the state machines for all the pana functions. I did not scrutinize them all to see if they were accurate, though I did look at a few of them and those were cleanly described and well thought out. It's a bit weird for a document associated with a security protocol to have such a short security considerations section: " This document's intent is to describe the PANA state machines fully. To this end, any security concerns with this document are likely a reflection of security concerns with PANA itself." But really they are correct -- that the security considerations are for the PANA protocol itself. So I see no problems with this document. Radia