TCP does not provide "delivery assurance". If the application needs to know the data got through, it must use application-level ackwowledgements. SSL does not change this and provides the same set of guarantees and assurances
TCP does.

I'm sorry to disagree but TCP, unlike UDP, does provide "reliable data transfer". It does allow hijacking. I'll take from wikipedia to try to explain better

http://en.wikipedia.org/wiki/Transmission_Control_Protocol

"TCP is a reliable stream delivery service that guarantees delivery of a data stream sent from one host to another without duplication or losing data. Since packet transfer is not reliable, a technique known as positive acknowledgment with retransmission is used to guarantee reliability of packet transfers. This fundamental technique requires the receiver to respond with an acknowledgment message as it receives the data. The sender keeps a record of each packet it sends, and waits for acknowledgment before sending the next packet. The sender also keeps a timer from when the packet was sent, and retransmits a packet if the timer expires. The timer is needed in case a packet gets lost or corrupted.

[...]

An attacker who is able to eavesdrop a TCP session and redirect packets can hijack a TCP connection. To do so, the attacker learns the sequence number from the ongoing communication and forges a false packet that looks like the next packet in the stream. Such a simple hijack can result in one packet being erroneously accepted at one end."

I guess this can be done with ACKs as well. I'm almost absolutely sure SSL can detect these hijacks and signal an alert, but I wanted to be sure.

Maybe I'll try some ASCII-art tomorrow or get an experimental answer by capturing an SSL session and seeing exactly what goes to and from. I suspect the "sequence number" field of SSL record segments mentioned in the RFC might be what I'm looking for...

Thanks anyway!
João



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to