Skip to main content


tls_allow_renegotiation — determine whether to enable TLS renegotiation


TLS_Allow_Renegotiation = true|false


**Configuration Change. ** Support for GNUTLS is available as of version 4.1 for SMTP reception and SMTP deliveries only.

This option determines whether TLS renegotiation is enabled or disabled.


When TLS_Engine is set to openssl, this option is supported by the ESMTP, HTTP, and ECStream listeners. SSL/TLS renegotiation has a known, inherent, vulnerability to DoS attacks that openSSL views as the responsibility of the higher level application to mitigate. TLS_Allow_Renegotiation addresses this issue by making it possible to deny renegotiation requests.


If you have C policy scripts that incorporate calls to ec_ssl_renegotiate please note this behavior. In some circumstances, setting this option to false may shut down valid attempts at renegotiation and needlessly drop connections.

This option can be set to the following:

  • true – Renegotiations are allowed.

  • false – Renegotiations are not allowed at all. When renegotiation is disabled and a renegotiation is attempted from the peer, the openSSL session does not close immediately and waits for the SSL connection to timeout.


When TLS_Engine is set to gnutls, this option is supported by the ESMTP listener only.

This option can be set to the following:

The default value is true.


tls_allow_renegotiation is valid in the ecstream_listener, esmtp_listener, http_listener, pathway, pathway_group and xmpp_listener scopes and the listen and peer scopes within those listeners.

See Also

Was this page helpful?