So I think I've interpreted your question correctly. If not, fire away in the comments.
Confusingly there are several factors in diffie hellman: are you doing it over elliptic curves or not, what size group have you got (let's assume "strong" and "not strong") and whether you generate ephemeral private/public keypairs or not.
The problem with logjam is this: if you have a plain old group variant of DHE, then if you can persuade the server to downgrade to the export (weak variety) level strength, then with some precomputations made before you can break the secret generated for a session in minutes.
This is conditional on being able to downgrade size variable to a smaller one - if you can do this over the plain old DHE variant, then you're in business.
This requires the cipher suite have DHE_..._EXPORT_...
in it, such as TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
. Now that has a bunch of other problems like 40-bit DES and whatnot, but essentially, there could feasibly be some servers out there that support EXPORT variants of DHE with better symmetric ciphers. Or they could actually be negotiating 40-bit DES if persuaded.
The point is to perform a downgrade attack. The cipher suite list you've given doesn't allow for export ciphers.
You could turn off all non-EC variants of DH. However, this might limit client side support. Whether or not you can be so limiting is really up to you. But "DHE" in and of itself is fine, unless there's export in there somewhere. Make sure export ciphers are disabled, and follow Thomas' advice in the answer you linked.
Now on to SSLDHParametersFile
- in DHE, the prime and generator of the group can actually be fixed ahead of time - the bit that is ephemeral is the private key chosen in that group. This way, by setting the parameters you can control what size group your server uses.
For example, the output of this might be:
openssl dhparam 2048 -text
<snip>
PKCS#3 DH Parameters: (2048 bit)
prime:
00:bd:90:31:72:a5:bf:eb:96:b0:0e:1c:1e:3f:ff:
cd:0a:e2:fc:14:72:50:19:f8:6d:e9:25:3c:3d:21:
3b:3c:e3:93:9b:2e:a1:b5:98:dc:25:88:9c:9e:55:
1a:78:36:a8:10:67:f2:f1:37:e7:6b:c7:b8:39:85:
a7:ec:aa:e9:2f:4e:10:17:fd:72:e1:22:2e:ab:97:
4b:bf:7b:a2:68:6d:94:a8:ae:df:e0:fb:66:ad:79:
02:9c:09:ba:47:60:40:12:a8:27:46:ba:8f:a9:8b:
bd:f5:d2:4e:67:0c:7a:49:f3:9d:80:98:50:4d:8c:
72:38:47:91:4b:54:1f:3b:74:b5:81:30:c7:89:71:
b0:87:8a:82:66:b0:06:f6:2e:a6:2b:e8:18:51:23:
2d:09:d9:0a:87:03:7b:85:8a:27:c6:bd:fa:e9:16:
70:b3:bf:ad:77:d5:55:72:22:e7:7c:6b:4e:31:2c:
86:91:7a:51:11:ac:23:9d:5f:3d:f1:f2:83:02:98:
72:a2:a4:c5:a8:26:40:25:02:59:00:80:22:37:ac:
38:95:07:76:f5:31:3d:19:f6:81:36:6c:14:fa:d8:
46:10:e1:b4:fa:5f:e2:9d:2f:a1:78:47:5d:9c:f9:
ac:0c:06:83:dc:f4:2d:81:17:d4:34:1b:6f:c2:c7:
2c:0b
generator: 2 (0x2)
Tellingly, from your example bug, it sounds like it is not possible to use these parameter files quite yet with Tomcat. I'm not an expert on Tomcat, so, I can't really say but if you have instructed the cipher suites to not allow export, OpenSSL should default to a 1024-bit DH group, which is good enough for now.
You can, then, when the patch is available, upgrade your DH parameters as you see fit.