This article applies to PRTG Network Monitor 14.4.2 or later
Modifying Key Length for Diffie-Hellman Parameters
PRTG comes with a high security standard that makes your network monitoring as secure as possible. All communication in PRTG is secured by SSL encryption where only the most secure ciphers are supported. We describe important security features of PRTG in the article What security features does PRTG include?
As of PRTG version 14.4.12, PRTG uses unique pre-defined Diffie-Hellman (DH) parameters with a 1024-bit key by default. This key length is sufficient for most scenarios, but if you want to enhance this key and generate a key that is longer than 1024-bits, you can do so as well. For example, you can manually generate a key with 2048-bits.
Creating a Longer Key for DH Parameters
Please follow the steps below to adjust the key length for Diffie-Hellman parameters:
- On your PRTG server, navigate to the \cert subfolder of your PRTG installation directory.
- Open the file generatedh.bat with a text editor. By default, it contains the following command:
..\openssl.exe dhparam -out dh.pem -2 1024 2> dh.log
- To create DH parameters with a 2048-bit key, replace 1024 with 2048 in generatedh.bat. When executed, this results in the file dh.pem with this key length.
- Please note that the longer the generated key is, the longer will it need to be generated. Because of this, we recommend that you temporarily use another output file for generatedh.bat. So, in the .bat file, change dh.pem to dh-long.pem, for example:
..\openssl.exe dhparam -out dh-long.pem -2 2048 2> dh.log
- Stop the PRTG core server.
- Change the name of the newly created file dh-long.pem to the original name dh.pem
- Start the PRTG core server.
Done! PRTG now uses DH parameters with a 2048-bit key.
Add comment