Hi,

I've got a newbie question about a possible SSL/OpenSSL

Consider two machines A and B and a man-in-the-middle, Z, who can snoop traffic.

A and B exchange certificates securely, i.e. Z lets the SSL handshake through. Therefore A sends a first application-data message to B.

Z cannot read the message since it is encrypted, but I guess he can block it, right?

My question is, can Z fake TCP ACK segments, with sequence number and everything, and replay them to A so that A thinks that B has received the message and B never realizes that A sent a message?

I can't understand if legitimate TCP ACK segments also need to be encrypted/signed in some way agreed upon during the handshake.

In other words, do I need to implement application-level acknowledge messages?

If so, why?

Thanks a lot!!
Joao
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to