Client IP spoofing to carry out a TLS conversation, when the server only accepts connections from that client IP?

I am aware that IP spoofing can be used to carry out SYN flooding attacks, and impersonating servers.
However, I have not been able to find detailed step-by-step attack scenarios: where the attacker (let’s assume is on-path between the cli… Continue reading Client IP spoofing to carry out a TLS conversation, when the server only accepts connections from that client IP?