TLS Handshake - OSDev Wiki
Nov 22, 2009 Transport Layer Security (TLS) handshake renegotiation Jun 23, 2018 TLS Renegotiation attack – Microsoft workaround/patch Feb 09, 2010 TLS Renegotiation and Denial of Service Attacks | Qualys
TLS protocol session renegotiation fix Server 2008 R2
The server treats the client's initial TLS handshake as a renegotiation and thus believes that the initial data transmitted by the attacker is from the same entity as the subsequent client data. This issue affects SSL version 3.0 and newer and TLS version 1.0 and newer.
TLS clients which do not support the new secure renegotiation protocol will be refused by any properly patched TLS server if they submit an original style TLS renegotation request. (The most common use, AFAIK, of TLS renegotiation has been to allow an HTTPS server to request client certificate authentication after the original TLS handshake has
10 Online Tool to Test SSL, TLS and Latest Vulnerability Sep 15, 2019 Configure "-denySSLReneg" Parameter to Disable Client Side ALL: Deny secure and non-secure SSL renegotiation for the preceding two cases and for server initiated renegotiation. NONSECURE: Deny non-secure SSL renegotiation to address the vulnerability described in RFC 5746. Note: The NONSECURE option is supported …