| Description | This article explains why DNS over TLS (DoT) is able to mitigate 'Secure Client-Initiated Renegotiation' or 'Client-initiated Re-negotiations'. |
| Scope | FortiGate. |
| Solution |
DNS over TLS (DoT) is not intrinsically susceptible to the legacy SSL/TLS client-initiated renegotiation vulnerability, as its reliance on TLS 1.2 or 1.3 ensures the use of protocol-level controls that either substantially mitigate or entirely preclude this attack vector.
Contemporary DoT servers and modern TLS stacks typically enforce stringent rate-limiting controls on renegotiation handshakes—assuming the mechanism is enabled at all—which substantially reduces the feasibility of renegotiation-based DoS vectors.
Hence, the 'Secure Client-Initiated Renegotiation' vulnerability report on DNS over TLS (DoT) is a false positive. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.