init.rst.inc 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159
  1. .. IMPORTANT: this file is auto-generated from borg's built-in help, do not edit!
  2. .. _borg_init:
  3. borg init
  4. ---------
  5. .. code-block:: none
  6. borg [common options] init [options] [REPOSITORY]
  7. .. only:: html
  8. .. class:: borg-options-table
  9. +-------------------------------------------------------+------------------------------------+-----------------------------------------------------------------------------+
  10. | **positional arguments** |
  11. +-------------------------------------------------------+------------------------------------+-----------------------------------------------------------------------------+
  12. | | ``REPOSITORY`` | repository to create |
  13. +-------------------------------------------------------+------------------------------------+-----------------------------------------------------------------------------+
  14. | **optional arguments** |
  15. +-------------------------------------------------------+------------------------------------+-----------------------------------------------------------------------------+
  16. | | ``-e MODE``, ``--encryption MODE`` | select encryption key mode **(required)** |
  17. +-------------------------------------------------------+------------------------------------+-----------------------------------------------------------------------------+
  18. | | ``--append-only`` | create an append-only mode repository |
  19. +-------------------------------------------------------+------------------------------------+-----------------------------------------------------------------------------+
  20. | | ``--storage-quota QUOTA`` | Set storage quota of the new repository (e.g. 5G, 1.5T). Default: no quota. |
  21. +-------------------------------------------------------+------------------------------------+-----------------------------------------------------------------------------+
  22. | .. class:: borg-common-opt-ref |
  23. | |
  24. | :ref:`common_options` |
  25. +-------------------------------------------------------+------------------------------------+-----------------------------------------------------------------------------+
  26. .. raw:: html
  27. <script type='text/javascript'>
  28. $(document).ready(function () {
  29. $('.borg-options-table colgroup').remove();
  30. })
  31. </script>
  32. .. only:: latex
  33. REPOSITORY
  34. repository to create
  35. optional arguments
  36. -e MODE, --encryption MODE select encryption key mode **(required)**
  37. --append-only create an append-only mode repository
  38. --storage-quota QUOTA Set storage quota of the new repository (e.g. 5G, 1.5T). Default: no quota.
  39. :ref:`common_options`
  40. |
  41. Description
  42. ~~~~~~~~~~~
  43. This command initializes an empty repository. A repository is a filesystem
  44. directory containing the deduplicated data from zero or more archives.
  45. Encryption can be enabled at repository init time. It cannot be changed later.
  46. It is not recommended to work without encryption. Repository encryption protects
  47. you e.g. against the case that an attacker has access to your backup repository.
  48. But be careful with the key / the passphrase:
  49. If you want "passphrase-only" security, use one of the repokey modes. The
  50. key will be stored inside the repository (in its "config" file). In above
  51. mentioned attack scenario, the attacker will have the key (but not the
  52. passphrase).
  53. If you want "passphrase and having-the-key" security, use one of the keyfile
  54. modes. The key will be stored in your home directory (in .config/borg/keys).
  55. In the attack scenario, the attacker who has just access to your repo won't
  56. have the key (and also not the passphrase).
  57. Make a backup copy of the key file (keyfile mode) or repo config file
  58. (repokey mode) and keep it at a safe place, so you still have the key in
  59. case it gets corrupted or lost. Also keep the passphrase at a safe place.
  60. The backup that is encrypted with that key won't help you with that, of course.
  61. Make sure you use a good passphrase. Not too short, not too simple. The real
  62. encryption / decryption key is encrypted with / locked by your passphrase.
  63. If an attacker gets your key, he can't unlock and use it without knowing the
  64. passphrase.
  65. Be careful with special or non-ascii characters in your passphrase:
  66. - Borg processes the passphrase as unicode (and encodes it as utf-8),
  67. so it does not have problems dealing with even the strangest characters.
  68. - BUT: that does not necessarily apply to your OS / VM / keyboard configuration.
  69. So better use a long passphrase made from simple ascii chars than one that
  70. includes non-ascii stuff or characters that are hard/impossible to enter on
  71. a different keyboard layout.
  72. You can change your passphrase for existing repos at any time, it won't affect
  73. the encryption/decryption key or other secrets.
  74. Encryption modes
  75. ++++++++++++++++
  76. .. nanorst: inline-fill
  77. +----------+---------------+------------------------+--------------------------+
  78. | Hash/MAC | Not encrypted | Not encrypted, | Encrypted (AEAD w/ AES) |
  79. | | no auth | but authenticated | and authenticated |
  80. +----------+---------------+------------------------+--------------------------+
  81. | SHA-256 | none | `authenticated` | repokey |
  82. | | | | keyfile |
  83. +----------+---------------+------------------------+--------------------------+
  84. | BLAKE2b | n/a | `authenticated-blake2` | `repokey-blake2` |
  85. | | | | `keyfile-blake2` |
  86. +----------+---------------+------------------------+--------------------------+
  87. .. nanorst: inline-replace
  88. `Marked modes` are new in Borg 1.1 and are not backwards-compatible with Borg 1.0.x.
  89. On modern Intel/AMD CPUs (except very cheap ones), AES is usually
  90. hardware-accelerated.
  91. BLAKE2b is faster than SHA256 on Intel/AMD 64-bit CPUs
  92. (except AMD Ryzen and future CPUs with SHA extensions),
  93. which makes `authenticated-blake2` faster than `none` and `authenticated`.
  94. On modern ARM CPUs, NEON provides hardware acceleration for SHA256 making it faster
  95. than BLAKE2b-256 there. NEON accelerates AES as well.
  96. Hardware acceleration is always used automatically when available.
  97. `repokey` and `keyfile` use AES-CTR-256 for encryption and HMAC-SHA256 for
  98. authentication in an encrypt-then-MAC (EtM) construction. The chunk ID hash
  99. is HMAC-SHA256 as well (with a separate key).
  100. These modes are compatible with Borg 1.0.x.
  101. `repokey-blake2` and `keyfile-blake2` are also authenticated encryption modes,
  102. but use BLAKE2b-256 instead of HMAC-SHA256 for authentication. The chunk ID
  103. hash is a keyed BLAKE2b-256 hash.
  104. These modes are new and *not* compatible with Borg 1.0.x.
  105. `authenticated` mode uses no encryption, but authenticates repository contents
  106. through the same HMAC-SHA256 hash as the `repokey` and `keyfile` modes (it uses it
  107. as the chunk ID hash). The key is stored like `repokey`.
  108. This mode is new and *not* compatible with Borg 1.0.x.
  109. `authenticated-blake2` is like `authenticated`, but uses the keyed BLAKE2b-256 hash
  110. from the other blake2 modes.
  111. This mode is new and *not* compatible with Borg 1.0.x.
  112. `none` mode uses no encryption and no authentication. It uses SHA256 as chunk
  113. ID hash. Not recommended, rather consider using an authenticated or
  114. authenticated/encrypted mode. This mode has possible denial-of-service issues
  115. when running ``borg create`` on contents controlled by an attacker.
  116. Use it only for new repositories where no encryption is wanted **and** when compatibility
  117. with 1.0.x is important. If compatibility with 1.0.x is not important, use
  118. `authenticated-blake2` or `authenticated` instead.
  119. This mode is compatible with Borg 1.0.x.