I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG.  These comments were written primarily for the benefit of the security area directors.  Document editors and WG chairs should treat these comments just like any other last call comments. I believe this document ( draft-ietf-softwire-dslite-deployment) has an adequate security considerations section and the main security risks are sufficiently described for an informational "deployment considerations" RFC. COMMENTS: section 2.6: "Internet hosts such as servers must no longer rely solely on IP address to identify an abused user." Don't you mean here: "... an abusive user." and again in the next sentence "...to identify an abused user..." should be "...to identify an abusive user". Nits: - section 1: Overview third sentence: first mention of "softwire" may require a reference - section 2.5, last paragraph: s/Depedning on the rate of NAT table changes/Depending on the rate of NAT table changes Best regards, Tobias