I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This document describes the guidelines to evaluate new congestion control algorithms for interactive point-to-point real-time media. It asserts that as a document providing evaluation criteria and parameters for assessing and comparing performance that it is not subject to security considerations, but that evaluated protocols may be. This seems sufficient. The document is ready with some minor nits like an incomplete sentence in third paragraph of first section and some difficult to parse language in the jitter section ("jitter is a smoothed estimate of jitter", for example).