I understand that SSL/TLS is built on top of TCP. That is after a TCP connection is established, an SSL handshake can be started, when it is completed, all communication will be encrypted and authenticated. To close the connection a specific alert is used.
I would like to understand whether an attacker is able to terminate a TCP connection if SSL/TLS has been used to protect the data used in a TCP Segment
I have found this...
If an attacker tries to terminate the connection by finishing the TCP connection (injecting a FIN packet), the communicating parties will know the connection is improperly terminated. The connection cannot however be terminated, only interrupted.
But I would like to know how the communicating parties would know the connection is improperly terminated and why it is only interrupted.
Furthermore, is the injection of a TCP FIN message the same as injecting a TCP RST message to tear down the connection?
Any thoughts?