|
@@ -259,32 +259,21 @@ Keep an eye on CPU load and throughput.
|
|
|
Repository encryption
|
|
|
---------------------
|
|
|
|
|
|
-Repository encryption can be enabled or disabled at repository creation time
|
|
|
-(the default is enabled, with `repokey` method)::
|
|
|
+You can choose the repository encryption mode at repository creation time::
|
|
|
|
|
|
- $ borg init --encryption=none|repokey|keyfile PATH
|
|
|
+ $ borg init --encryption=MODE PATH
|
|
|
|
|
|
-When repository encryption is enabled all data is encrypted using 256-bit AES_
|
|
|
-encryption and the integrity and authenticity is verified using `HMAC-SHA256`_.
|
|
|
+For a list of available encryption MODEs and their descriptions, please refer
|
|
|
+to :ref:`borg_init`.
|
|
|
|
|
|
-All data is encrypted on the client before being written to the repository. This
|
|
|
-means that an attacker who manages to compromise the host containing an
|
|
|
-encrypted archive will not be able to access any of the data, even while the backup
|
|
|
-is being made.
|
|
|
+If you use encryption, all data is encrypted on the client before being written
|
|
|
+to the repository.
|
|
|
+This means that an attacker who manages to compromise the host containing an
|
|
|
+encrypted repository will not be able to access any of the data, even while the
|
|
|
+backup is being made.
|
|
|
|
|
|
-Borg supports different methods to store the AES and HMAC keys.
|
|
|
-
|
|
|
-``repokey`` mode
|
|
|
- The key is stored inside the repository (in its "config" file).
|
|
|
- Use this mode if you trust in your good passphrase giving you enough
|
|
|
- protection. The repository server never sees the plaintext key.
|
|
|
-
|
|
|
-``keyfile`` mode
|
|
|
- The key is stored on your local disk (in ``~/.config/borg/keys/``).
|
|
|
- Use this mode if you want "passphrase and having-the-key" security.
|
|
|
-
|
|
|
-In both modes, the key is stored in encrypted form and can be only decrypted
|
|
|
-by providing the correct passphrase.
|
|
|
+Key material is stored in encrypted form and can be only decrypted by providing
|
|
|
+the correct passphrase.
|
|
|
|
|
|
For automated backups the passphrase can be specified using the
|
|
|
`BORG_PASSPHRASE` environment variable.
|