In this paper we use FDR, a model checker for CSP, to detect errors in
the TMN protocol [18]. We model the protocol and a very general intru
der as CSP processes, and use the model checker to test whether the in
truder can successfully attack the protocol. We consider three variant
s on the protocol, and discover a total of 10 different attacks leadin
g to breaches of security.