Skip to content

Commit ee9dfc0

Browse files
authored
Merge pull request #6609 from MitchellSternke/MitchellSternke-patch-2
Update sql-server-linux-encrypted-connections.md
2 parents f70c780 + 0a4afa3 commit ee9dfc0

1 file changed

Lines changed: 14 additions & 0 deletions

File tree

docs/linux/sql-server-linux-encrypted-connections.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -148,3 +148,17 @@ systemctl restart mssql-server
148148
|The target principal name is incorrect. |Make sure that Common Name field on SQL Server's certificate matches the server name specified in the client's connection string. |
149149
|An existing connection was forcibly closed by the remote host. |This error can occur when the client doesn't support the TLS protocol version required by SQL Server. For example, if [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] is configured to require TLS 1.2, make sure your clients also support the TLS 1.2 protocol. |
150150
| | |
151+
152+
### Ubuntu 20.04 and other recent Linux distribution releases
153+
154+
**Symptom**
155+
156+
When a [!INCLUDE[ssNoVersion](../includes/ssnoversion-md.md)] on Linux instance loads a certificate that was created with a signature algorithm using less than 112 bits of security (examples: MD5, SHA-1), you might observe a connection failure error, like this example:
157+
158+
`A connection was successfully established with the server, but then an error occurred during the login process. (provider: SSL Provider, error: 0 - An existing connection was forcibly closed by the remote host.) (Microsoft SQL Server, Error: 10054)`
159+
160+
The error is due to OpenSSL security level 2 being enabled by default on Ubuntu 20.04 and later. Security level 2 prohibits TLS connections that have less than 112 bits of security from being established.
161+
162+
**Solution**
163+
164+
Install a certificate with a signature algorithm using at least 112 bits of security. Signature algorithms that satisfy this requirement include SHA-224, SHA-256, SHA-384, and SHA-512.

0 commit comments

Comments
 (0)