Skip to main content

The quantum-enabled hybrid key rotator for WireGuard tunnels.

Project description

logo_with_white_text

wg-Qrotator is the quantum-enabled hybrid key rotator for WireGuard IP tunnels.

Check the documentation for more in-depth information about the solution.

How to set up and run

Before starting wg-Qrotator, the peers must be already connected through WireGuard.

First, install the main dependencies:

sudo apt install python3 python3-pip libexplain-dev build-essential automake autoconf libtool pkg-config git

Then, from the root directory of the repository, install wg-Qrotator:

pip install wg-Qrotator

Next, create a yaml configuration file that includes information about the WireGuard network interface, the KMS and the peers.

Example of a configuration file:

interface: wg0  # WireGuard interface to manage
port: 2345 # Port where the rotator will be exposed to its peers on the specified WireGuard's interface 
secret_auth_key: priv_auth.key # Private key used for authentication 

kms: 
  uri: "https://127.0.0.1:8443/api/v1/keys" # KMS URI
  certificate: private/certs/sae_001.crt    # SAE certificate
  root_certificate: private/certs/root.crt  # Root CA certificate
  secret_key: private/certs/sae_001.key     # SAE private key
  sae: sae_001                              # SAE ID
  interface: 14                             # KMS interface (4 for ETSI QKD 004, 14 for ETSI QKD 014)

# Information about the peers
peers:
  - 9OmSKzF5QHD5mckhBHyoN2uPPRGJNDYOl15+DKbtV1M=: # ID (public key) of the peer
      public_auth_key: pub_auth_0.key # Peer public key used for authentication 
      ip: 10.0.0.2                    # IP of the peer
      port: 2347                      # Port of the peer rotator
      sae: sae_002                    # SAE of the peer in the KMS
      mode: client                    # Mode (client/server)
      extra_handshakes:               # PQ extra handshakes
      - ML_KEM_1024:                  # KEM to use in PQ-KE
  - 12mSKzF5QHd57ckhBHyoN2uPPRGJNDYOl15+dfbt19L=: # Another peer...
      public_auth_key: pub_auth_1.key
      ip: 10.0.0.3
      port: 3456
      sae: sae_003
      mode: server

Note that each entity that participates must be registered in the KMS and the certificate and keys must be set up for the requests to be made. Also, make sure that the IPs that are being used are the ones that point to WireGuard's interface, this way all the communications will go through the already established secure tunnel.

The mode tells the role for this rotator when interacting with a given peer. The client is the initiator, and the server will only act upon the client's request. Note that the indicated mode is the one used by the entity that uses this configuration file, for the other peer it shall be the opposite.

To generate the authentication key for each rotator, use the genauthkeys command as in the following example:

wg-qrotator genauthkeys priv_auth.key pub_auth.key

Start the rotator on each peer by running:

wg-qrotator up <config.yaml>

Note that sudo privileges might be needed in order to monitor and update WireGuards PSKs.

A log file is stored in the default logs directory (e.g. /var/log/ for Linux) under the name wg_qrotator_<wg_interface>.log.

Key combination

There is the possibility to add key exchanges and use their respective resulting keys in the key combination process. The final pre-shared key will be the OTP of the key given by the KMS and all the other keys extracted from extra key exchanges.

To activate extra key exchanges just add the field extra_handshakes for a given peer and enumerate the name of the exchanges to be used. For example:

...
peers:
  - 9OmSKzF5QHD5mckhBHyoN2uPPRGJNDYOl15+DKbtV1M=: 
      ...
      extra_handshakes:
        - ML_KEM_512:
        - ...

The following key exchanges are supported:

  • ML_KEM_512
  • ML_KEM_768
  • ML_KEM_1024

License

© 2025, IT - Instituto de Telecomunicações

This project is licensed under the GNU Affero General Public License v3.0.

Acknowledgements

This project was supported by:

  • the members of the NATO STO IST-218 RTG with title “Multi-Domain Quantum Key Distribution (QKD) for Military Usage”;
  • the NATO Emerging Security Challenges Division through the Science for Peace and Security (SPS) programme under the project QSCAN reference: G6158-MYP;
  • the European Union’s Horizon Europe research and innovation programme under the project "Quantum Secure Networks Partnership" (QSNP, grant agreement No 101114043).

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

wg_qrotator-0.1.4.tar.gz (1.4 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

wg_qrotator-0.1.4-py3-none-any.whl (53.5 kB view details)

Uploaded Python 3

File details

Details for the file wg_qrotator-0.1.4.tar.gz.

File metadata

  • Download URL: wg_qrotator-0.1.4.tar.gz
  • Upload date:
  • Size: 1.4 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for wg_qrotator-0.1.4.tar.gz
Algorithm Hash digest
SHA256 c0b95a52d614b2a3e5241e3878773cd5b98004e9e3c96968ab8919d26d7d3841
MD5 23343df5bfbe2dbb21995daab5f71b16
BLAKE2b-256 3115b48cf1cc628c13001c1321da6a48307dc570ba26a38bad655e4d8288dbc1

See more details on using hashes here.

Provenance

The following attestation bundles were made for wg_qrotator-0.1.4.tar.gz:

Publisher: python-publish.yml on Quantum-Communication-Group/wg-Qrotator

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file wg_qrotator-0.1.4-py3-none-any.whl.

File metadata

  • Download URL: wg_qrotator-0.1.4-py3-none-any.whl
  • Upload date:
  • Size: 53.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for wg_qrotator-0.1.4-py3-none-any.whl
Algorithm Hash digest
SHA256 fd1ea0d9655b3a9214e7bcaf8991f1714dc5d451d51a712b45f3e2392052044a
MD5 98824eef86777509ebbf4be990fe0c65
BLAKE2b-256 0355bd8d9b14a25ff6d1b40b525fbccb5fd36fd2768d421b599d8a23d3d4b45b

See more details on using hashes here.

Provenance

The following attestation bundles were made for wg_qrotator-0.1.4-py3-none-any.whl:

Publisher: python-publish.yml on Quantum-Communication-Group/wg-Qrotator

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page