Suppose Alice and Bob are communicating over an SSL session.
Suppose an attacker, who does not have any of the shared keys, inserts a bogus
TCP segment into a packet stream with correct TCP checksum and sequence numbers
(and correct IP addresses and port numbers).
Will SSL at the receiving side accept the bogus packet and
pass the payload to the receiving application? Why or why not?