diff --git a/changes/bug5598 b/changes/bug5598
new file mode 100644
index 0000000000000000000000000000000000000000..e8e67415bd1745851b2775c00ac6b678818392ea
--- /dev/null
+++ b/changes/bug5598
@@ -0,0 +1,5 @@
+  o Changed defaults:
+    - Change the default value for DynamicDHGroups to 0. This feature can
+      make Tor relays less identifiable by their use of the mod_ssl DH
+      group, but at the cost of some usability (#4721) and bridge tracing
+      (#6087) regressions. Resolves ticket #5598.
diff --git a/doc/tor.1.txt b/doc/tor.1.txt
index 3e7541b2a06585e0b2ec6249b532df2be0db5893..78a33ca7937b3253a8970b439df60570db18c386 100644
--- a/doc/tor.1.txt
+++ b/doc/tor.1.txt
@@ -266,7 +266,7 @@ Other options can be specified either on the command-line (--option
     If this option is set to 1, when running as a server, generate our
     own Diffie-Hellman group instead of using the one from Apache's mod_ssl.
     This option may help circumvent censorship based on static
-    Diffie-Hellman parameters. (Default: 1)
+    Diffie-Hellman parameters. (Default: 0)
 
 **AlternateDirAuthority** [__nickname__] [**flags**] __address__:__port__ __fingerprint__ +
 
diff --git a/src/or/config.c b/src/or/config.c
index 2e3ce6429dce4d86f911269152c10076e1f59f8c..1fc5806f111cd3459eabe33de1226c94c54910a3 100644
--- a/src/or/config.c
+++ b/src/or/config.c
@@ -257,7 +257,7 @@ static config_var_t _option_vars[] = {
   V(DisableAllSwap,              BOOL,     "0"),
   V(DisableDebuggerAttachment,   BOOL,     "1"),
   V(DisableIOCP,                 BOOL,     "1"),
-  V(DynamicDHGroups,             BOOL,     "1"),
+  V(DynamicDHGroups,             BOOL,     "0"),
   V(DNSPort,                     LINELIST, NULL),
   V(DNSListenAddress,            LINELIST, NULL),
   V(DownloadExtraInfo,           BOOL,     "0"),