Assume that you're using Transport Layer Security (TLS) protocol version 1.2 in Microsoft SQL Server. When the certificate that's used to encrypt the endpoint communication for database mirroring, availability groups, and service broker uses an MD5 hashing algorithm, communication fails. Additionally, you receive the following error message in SQL Server Error log:
Connection handshake failed. An OS call failed: (80090331) 0x80090331(The client and server cannot communicate, because they do not possess a common algorithm.). State 58.'.
Additionally, the Windows log reports the following Schannel error:
A fatal alert was generated and sent to the remote endpoint. This may result in termination of the connection. The TLS protocol defined fatal error code is 40. The Windows SChannel error state is 1205.
This issue occurs because TLS 1.2 doesn't support MD5 as a signature hash algorithm.
Based on current security best practices and standards, we recommend that you switch to a non-MD5 signature hash for certificates that are used for SQL Server endpoint encryption.
The list of fixed versions that support TLS 1.2 is available in the following Microsoft Knowledge Base article:
Microsoft SQL Server 2014 Developer, Microsoft SQL Server 2014 Enterprise, Microsoft SQL Server 2014 Standard, Microsoft SQL Server 2012 Developer, Microsoft SQL Server 2012 Enterprise, Microsoft SQL Server 2012 Standard, Microsoft SQL Server 2008 R2 Developer, Microsoft SQL Server 2008 R2 Enterprise, Microsoft SQL Server 2008 R2 Standard, Microsoft SQL Server 2008 Developer, Microsoft SQL Server 2008 Enterprise, Microsoft SQL Server 2008 Standard