The document summarizes research on vulnerabilities in the OpenFlow control channel and potential attacks. It describes conducting a man-in-the-middle attack on an OpenFlow network by sniffing OpenFlow traffic, sending a TCP reset to hijack the control session, and spoofing the controller. It also evaluates the OpenFlow specification making TLS optional and proposes using TLS and padding messages to prevent sequence number prediction attacks. The document analyzes several OpenFlow controllers and their TLS support and concludes more needs to be done to securely adopt SDN technologies.