%% You should probably cite rfc9175 instead of this I-D. @techreport{ietf-core-echo-request-tag-09, number = {draft-ietf-core-echo-request-tag-09}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-core-echo-request-tag/09/}, author = {Christian Amsüss and John Preuß Mattsson and Göran Selander}, title = {{CoAP: Echo, Request-Tag, and Token Processing}}, pagetotal = 31, year = 2020, month = mar, day = 9, abstract = {This document specifies enhancements to the Constrained Application Protocol (CoAP) that mitigate security issues in particular use cases. The Echo option enables a CoAP server to verify the freshness of a request or to force a client to demonstrate reachability at its claimed network address; it is now the recommeded way to mitigate amplification attacks. The Request-Tag option allows the CoAP server to match block-wise message fragments belonging to the same request. The update to the client Token processing requirements of RFC 7252 forbids non-secure reuse of Tokens to ensure binding of responses to requests when CoAP is used with security.}, }