| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100 | .. IMPORTANT: this file is auto-generated from borg's built-in help, do not edit!.. _borg_init:borg init---------::    borg init <options> REPOSITORYpositional arguments    REPOSITORY        repository to createoptional arguments    ``-e``, ``--encryption``        | select encryption key mode    ``-a``, ``--append-only``        | create an append-only mode repository`Common options`_    |Description~~~~~~~~~~~This command initializes an empty repository. A repository is a filesystemdirectory containing the deduplicated data from zero or more archives.Encryption can be enabled at repository init time.It is not recommended to work without encryption. Repository encryption protectsyou e.g. against the case that an attacker has access to your backup repository.But be careful with the key / the passphrase:If you want "passphrase-only" security, use one of the repokey modes. Thekey will be stored inside the repository (in its "config" file). In abovementioned attack scenario, the attacker will have the key (but not thepassphrase).If you want "passphrase and having-the-key" security, use one of the keyfilemodes. The key will be stored in your home directory (in .config/borg/keys).In the attack scenario, the attacker who has just access to your repo won'thave the key (and also not the passphrase).Make a backup copy of the key file (keyfile mode) or repo config file(repokey mode) and keep it at a safe place, so you still have the key incase it gets corrupted or lost. Also keep the passphrase at a safe place.The backup that is encrypted with that key won't help you with that, of course.Make sure you use a good passphrase. Not too short, not too simple. The realencryption / decryption key is encrypted with / locked by your passphrase.If an attacker gets your key, he can't unlock and use it without knowing thepassphrase.Be careful with special or non-ascii characters in your passphrase:- Borg processes the passphrase as unicode (and encodes it as utf-8),  so it does not have problems dealing with even the strangest characters.- BUT: that does not necessarily apply to your OS / VM / keyboard configuration.So better use a long passphrase made from simple ascii chars than one thatincludes non-ascii stuff or characters that are hard/impossible to enter ona different keyboard layout.You can change your passphrase for existing repos at any time, it won't affectthe encryption/decryption key or other secrets.Encryption modes++++++++++++++++`repokey` and `keyfile` use AES-CTR-256 for encryption and HMAC-SHA256 forauthentication in an encrypt-then-MAC (EtM) construction. The chunk ID hashis HMAC-SHA256 as well (with a separate key).These modes are compatible with borg 1.0.x.`repokey-blake2` and `keyfile-blake2` are also authenticated encryption modes,but use BLAKE2b-256 instead of HMAC-SHA256 for authentication. The chunk IDhash is a keyed BLAKE2b-256 hash.These modes are new and *not* compatible with borg 1.0.x.`authenticated` mode uses no encryption, but authenticates repository contentsthrough the same keyed BLAKE2b-256 hash as the other blake2 modes (it uses itas chunk ID hash). The key is stored like repokey.This mode is new and not compatible with borg 1.0.x.`none` mode uses no encryption and no authentication. It uses sha256 as chunkID hash. Not recommended, rather consider using an authenticated orauthenticated/encrypted mode.This mode is compatible with borg 1.0.x.Hardware acceleration will be used automatically.On modern Intel/AMD CPUs (except very cheap ones), AES is usuallyhardware-accelerated. BLAKE2b is faster than SHA256 on Intel/AMD 64bit CPUs,which makes `authenticated` faster than `none`.On modern ARM CPUs, NEON provides hardware acceleration for SHA256 making it fasterthan BLAKE2b-256 there.
 |