Check the active policy:
update-crypto-policies --show
Apply a new policy:
update-crypto-policies --set <POLICY>
Supported Policy Levels
DEFAULT: Reasonable, interoperable defaults for modern systems (eliminates legacy protocols).FUTURE: Conservative security profile using stricter cryptographic strengths (e.g., 256-bit ciphers only, disables older algorithms).LEGACY: Maximizes interoperability with older devices by allowing legacy algorithms (like RC4, 3DES).FIPS: Applies only algorithms permitted by FIPS 140 compliance requirements
Example:-
[root@testbox ~]# update-crypto-policies –show
DEFAULT
[root@testbox ~]#
[root@testbox ~]# update-crypto-policies –set LEGACY
Setting system policy to LEGACY
Note: System-wide crypto policies are applied on application start-up.
It is recommended to restart the system for the change of policies
to fully take place.
[root@testbox ~]#
[root@testbox ~]# update-crypto-policies –show
LEGACY
[root@testbox ~]#