I already know that a replay attack on an SSL handshake is ineffective, but if we suppose that an "intruder" has listened and has got all of the information from a previous handshake, how will the server recognise the attack?
This is for SSL with RSA one-way and for SSL with RSA one-way: verification on phase 2.
Could you please give advice?