Does it increase connection security if I regenerate the dhparam files used with NGINX on our servers periodically e.g. every week?
What issues may arise from this?
Is there any benefit in doing this?
Does it increase connection security if I regenerate the dhparam files used with NGINX on our servers periodically e.g. every week?
What issues may arise from this?
Is there any benefit in doing this?
Does it increase connection security if I regenerate the dhparam files used with NGINX on our servers periodically e.g. every week?
No, not significantly.
DH parameters are really just a large prime that takes a lot of time to be generated (because it needs to be a safe prime). Additionally there's a so-called "generator", but this one is cheap to generate.
Right now it is impossible to break a DH connection negotiated with a 2048-bit or longer safe prime. Thus if you regenerate your safe prime every week you gain no extra security beyong "unbreakable". However this should not be confused with generating your own proper (strong) parameters once. This is to make an internet-scale Logjam attack much more difficult, but as I already said is optional as the parameters can't be broken anyways.
What issues may arise from this?
More computational load. Generating the parameters is probably one of the most intense cryptographic computations you will encounter.
Is there any benefit in doing this?
You gain something like "super-forward-secrecy". With ephemeral Diffie-Hellman, the attacker needs to break each connection individually to recover plaintexts. The per-connection load can be reduced when applying the Logjam trick of doing one giant pre-computation for the parameters and only doing the last step for each connection. If you change your parameters regularly you limit the impact a Logjam-style attack could have. However, running the algorithm required for Logjam is infeasible for DH parameters that use long primes (e.g. 2048-bit or more) .