I understand that SSL/TLS
is built on top of TCP
. That is after a TCP
connection is established, an SSL
handshake can be started, when it is completed, all communication will be encrypted and authenticated. To close the connection a specific alert is used.
I would like to understand whether an attacker is able to terminate a TCP
connection if SSL/TLS
has been used to protect the data used in a TCP Segment
I have found this...
If an attacker tries to terminate the connection by finishing the TCP connection (injecting a FIN packet), the communicating parties will know the connection is improperly terminated. The connection cannot however be terminated, only interrupted.
But I would like to know how the communicating parties would know the connection is improperly terminated and why it is only interrupted.
Furthermore, is the injection of a TCP FIN
message the same as injecting a TCP RST
message to tear down the connection?
Any thoughts?