Assuming a controlled demarcation point is introduced in the network element (between
the OpenFlow and native control planes), the security questions revolve around
how the reserved ports (particularly CONTROLLER, NORMAL, FLOOD, and LOCAL)
could be exploited to allow access to native daemons on the hybrid (applications on the
controller or OpenFlow ports spoofing IGP peers and other protocol sessions to insert
or derive state) or the native network.