The protocol should allow it, even if the implementation perhaps limits users to the local network or some other more sensible security policy.
The implementation needs to be controllable and simple enough for basic users then. If something is possible, companies will abuse it.
If the protocol allows it, products using the protocol will require it.
This directly opposes design principles of secure and correct by construction.
If any of my colleagues would make an overly abstracted solution for a problem and ship it with a dsl to configure it, I would say no, and ask them to solve the problem at hand.