Hi, I've got a newbie question about a possible SSL/OpenSSL
Consider two machines A and B and a man-in-the-middle, Z, who can snoop traffic.
A and B exchange certificates securely, i.e. Z lets the SSL handshake through. Therefore A sends a first application-data message to B.
Z cannot read the message since it is encrypted, but I guess he can block it, right?
My question is, can Z fake TCP ACK segments, with sequence number and everything, and replay them to A so that A thinks that B has received the message and B never realizes that A sent a message?
I can't understand if legitimate TCP ACK segments also need to be encrypted/signed in some way agreed upon during the handshake.
In other words, do I need to implement application-level acknowledge messages?
If so, why? Thanks a lot!! Joao ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org