data-structures.rst 26 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717
  1. .. include:: ../global.rst.inc
  2. .. highlight:: none
  3. .. _data-structures:
  4. Data structures and file formats
  5. ================================
  6. .. _repository:
  7. Repository
  8. ----------
  9. .. Some parts of this description were taken from the Repository docstring
  10. |project_name| stores its data in a `Repository`, which is a filesystem-based
  11. transactional key-value store. Thus the repository does not know about
  12. the concept of archives or items.
  13. Each repository has the following file structure:
  14. README
  15. simple text file telling that this is a |project_name| repository
  16. config
  17. repository configuration
  18. data/
  19. directory where the actual data is stored
  20. hints.%d
  21. hints for repository compaction
  22. index.%d
  23. repository index
  24. lock.roster and lock.exclusive/*
  25. used by the locking system to manage shared and exclusive locks
  26. Transactionality is achieved by using a log (aka journal) to record changes. The log is a series of numbered files
  27. called segments_. Each segment is a series of log entries. The segment number together with the offset of each
  28. entry relative to its segment start establishes an ordering of the log entries. This is the "definition" of
  29. time for the purposes of the log.
  30. .. _config-file:
  31. Config file
  32. ~~~~~~~~~~~
  33. Each repository has a ``config`` file which which is a ``INI``-style file
  34. and looks like this::
  35. [repository]
  36. version = 1
  37. segments_per_dir = 10000
  38. max_segment_size = 5242880
  39. id = 57d6c1d52ce76a836b532b0e42e677dec6af9fca3673db511279358828a21ed6
  40. This is where the ``repository.id`` is stored. It is a unique
  41. identifier for repositories. It will not change if you move the
  42. repository around so you can make a local transfer then decide to move
  43. the repository to another (even remote) location at a later time.
  44. Keys
  45. ~~~~
  46. Repository keys are byte-strings of fixed length (32 bytes), they
  47. don't have a particular meaning (except for the Manifest_).
  48. Normally the keys are computed like this::
  49. key = id = id_hash(unencrypted_data)
  50. The id_hash function depends on the :ref:`encryption mode <borg_init>`.
  51. As the id / key is used for deduplication, id_hash must be a cryptographically
  52. strong hash or MAC.
  53. Segments
  54. ~~~~~~~~
  55. A |project_name| repository is a filesystem based transactional key/value
  56. store. It makes extensive use of msgpack_ to store data and, unless
  57. otherwise noted, data is stored in msgpack_ encoded files.
  58. Objects referenced by a key are stored inline in files (`segments`) of approx.
  59. 500 MB size in numbered subdirectories of ``repo/data``.
  60. A segment starts with a magic number (``BORG_SEG`` as an eight byte ASCII string),
  61. followed by a number of log entries. Each log entry consists of:
  62. * size of the entry
  63. * CRC32 of the entire entry (for a PUT this includes the data)
  64. * entry tag: PUT, DELETE or COMMIT
  65. * PUT and DELETE follow this with the 32 byte key
  66. * PUT follow the key with the data
  67. Those files are strictly append-only and modified only once.
  68. Tag is either ``PUT``, ``DELETE``, or ``COMMIT``.
  69. When an object is written to the repository a ``PUT`` entry is written
  70. to the file containing the object id and data. If an object is deleted
  71. a ``DELETE`` entry is appended with the object id.
  72. A ``COMMIT`` tag is written when a repository transaction is
  73. committed.
  74. When a repository is opened any ``PUT`` or ``DELETE`` operations not
  75. followed by a ``COMMIT`` tag are discarded since they are part of a
  76. partial/uncommitted transaction.
  77. Compaction
  78. ~~~~~~~~~~
  79. For a given key only the last entry regarding the key, which is called current (all other entries are called
  80. superseded), is relevant: If there is no entry or the last entry is a DELETE then the key does not exist.
  81. Otherwise the last PUT defines the value of the key.
  82. By superseding a PUT (with either another PUT or a DELETE) the log entry becomes obsolete. A segment containing
  83. such obsolete entries is called sparse, while a segment containing no such entries is called compact.
  84. Since writing a ``DELETE`` tag does not actually delete any data and
  85. thus does not free disk space any log-based data store will need a
  86. compaction strategy (somewhat analogous to a garbage collector).
  87. Borg uses a simple forward compacting algorithm,
  88. which avoids modifying existing segments.
  89. Compaction runs when a commit is issued (unless the :ref:`append_only_mode` is active).
  90. One client transaction can manifest as multiple physical transactions,
  91. since compaction is transacted, too, and Borg does not distinguish between the two::
  92. Perspective| Time -->
  93. -----------+--------------
  94. Client | Begin transaction - Modify Data - Commit | <client waits for repository> (done)
  95. Repository | Begin transaction - Modify Data - Commit | Compact segments - Commit | (done)
  96. The compaction algorithm requires two inputs in addition to the segments themselves:
  97. (i) Which segments are sparse, to avoid scanning all segments (impractical).
  98. Further, Borg uses a conditional compaction strategy: Only those
  99. segments that exceed a threshold sparsity are compacted.
  100. To implement the threshold condition efficiently, the sparsity has
  101. to be stored as well. Therefore, Borg stores a mapping ``(segment
  102. id,) -> (number of sparse bytes,)``.
  103. The 1.0.x series used a simpler non-conditional algorithm,
  104. which only required the list of sparse segments. Thus,
  105. it only stored a list, not the mapping described above.
  106. (ii) Each segment's reference count, which indicates how many live objects are in a segment.
  107. This is not strictly required to perform the algorithm. Rather, it is used to validate
  108. that a segment is unused before deleting it. If the algorithm is incorrect, or the reference
  109. count was not accounted correctly, then an assertion failure occurs.
  110. These two pieces of information are stored in the hints file (`hints.N`)
  111. next to the index (`index.N`).
  112. When loading a hints file, Borg checks the version contained in the file.
  113. The 1.0.x series writes version 1 of the format (with the segments list instead
  114. of the mapping, mentioned above). Since Borg 1.0.4, version 2 is read as well.
  115. The 1.1.x series writes version 2 of the format and reads either version.
  116. When reading a version 1 hints file, Borg 1.1.x will
  117. read all sparse segments to determine their sparsity.
  118. This process may take some time if a repository is kept in the append-only mode,
  119. which causes the number of sparse segments to grow. Repositories not in append-only
  120. mode have no sparse segments in 1.0.x, since compaction is unconditional.
  121. Compaction processes sparse segments from oldest to newest; sparse segments
  122. which don't contain enough deleted data to justify compaction are skipped. This
  123. avoids doing e.g. 500 MB of writing current data to a new segment when only
  124. a couple kB were deleted in a segment.
  125. Segments that are compacted are read in entirety. Current entries are written to
  126. a new segment, while superseded entries are omitted. After each segment an intermediary
  127. commit is written to the new segment. Then, the old segment is deleted
  128. (asserting that the reference count diminished to zero), freeing disk space.
  129. A simplified example (excluding conditional compaction and with simpler
  130. commit logic) showing the principal operation of compaction:
  131. .. figure::
  132. compaction.png
  133. (The actual algorithm is more complex to avoid various consistency issues, refer to
  134. the ``borg.repository`` module for more comments and documentation on these issues.)
  135. .. _internals_storage_quota:
  136. Storage quotas
  137. ~~~~~~~~~~~~~~
  138. Quotas are implemented at the Repository level. The active quota of a repository
  139. is determined by the ``storage_quota`` `config` entry or a run-time override (via :ref:`borg_serve`).
  140. The currently used quota is stored in the hints file. Operations (PUT and DELETE) during
  141. a transaction modify the currently used quota:
  142. - A PUT adds the size of the *log entry* to the quota,
  143. i.e. the length of the data plus the 41 byte header.
  144. - A DELETE subtracts the size of the deleted log entry from the quota,
  145. which includes the header.
  146. Thus, PUT and DELETE are symmetric and cancel each other out precisely.
  147. The quota does not track on-disk size overheads (due to conditional compaction
  148. or append-only mode). In normal operation the inclusion of the log entry headers
  149. in the quota act as a faithful proxy for index and hints overheads.
  150. By tracking effective content size, the client can *always* recover from a full quota
  151. by deleting archives. This would not be possible if the quota tracked on-disk size,
  152. since journaling DELETEs requires extra disk space before space is freed.
  153. Tracking effective size on the other hand accounts DELETEs immediately as freeing quota.
  154. .. rubric:: Enforcing the quota
  155. The storage quota is meant as a robust mechanism for service providers, therefore
  156. :ref:`borg_serve` has to enforce it without loopholes (e.g. modified clients).
  157. The following sections refer to using quotas on remotely accessed repositories.
  158. For local access, consider *client* and *serve* the same.
  159. Accordingly, quotas cannot be enforced with local access,
  160. since the quota can be changed in the repository config.
  161. The quota is enforcible only if *all* :ref:`borg_serve` versions
  162. accessible to clients support quotas (see next section). Further, quota is
  163. per repository. Therefore, ensure clients can only access a defined set of repositories
  164. with their quotas set, using ``--restrict-to-path``.
  165. If the client exceeds the storage quota the ``StorageQuotaExceeded`` exception is
  166. raised. Normally a client could ignore such an exception and just send a ``commit()``
  167. command anyway, circumventing the quota. However, when ``StorageQuotaExceeded`` is raised,
  168. it is stored in the ``transaction_doomed`` attribute of the repository.
  169. If the transaction is doomed, then commit will re-raise this exception, aborting the commit.
  170. The transaction_doomed indicator is reset on a rollback (which erases the quota-exceeding
  171. state).
  172. .. rubric:: Compatibility with older servers and enabling quota after-the-fact
  173. If no quota data is stored in the hints file, Borg assumes zero quota is used.
  174. Thus, if a repository with an enabled quota is written to with an older ``borg serve``
  175. version that does not understand quotas, then the quota usage will be erased.
  176. The client version is irrelevant to the storage quota and has no part in it.
  177. The form of error messages due to exceeding quota varies with client versions.
  178. A similar situation arises when upgrading from a Borg release that did not have quotas.
  179. Borg will start tracking quota use from the time of the upgrade, starting at zero.
  180. If the quota shall be enforced accurately in these cases, either
  181. - delete the ``index.N`` and ``hints.N`` files, forcing Borg to rebuild both,
  182. re-acquiring quota data in the process, or
  183. - edit the msgpacked ``hints.N`` file (not recommended and thus not
  184. documented further).
  185. .. _manifest:
  186. The manifest
  187. ------------
  188. The manifest is an object with an all-zero key that references all the
  189. archives. It contains:
  190. * Manifest version
  191. * A list of archive infos
  192. * timestamp
  193. * config
  194. Each archive info contains:
  195. * name
  196. * id
  197. * time
  198. It is the last object stored, in the last segment, and is replaced
  199. each time an archive is added, modified or deleted.
  200. .. _archive:
  201. Archives
  202. --------
  203. The archive metadata does not contain the file items directly. Only
  204. references to other objects that contain that data. An archive is an
  205. object that contains:
  206. * version
  207. * name
  208. * list of chunks containing item metadata (size: count * ~40B)
  209. * cmdline
  210. * hostname
  211. * username
  212. * time
  213. .. _archive_limitation:
  214. Note about archive limitations
  215. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
  216. The archive is currently stored as a single object in the repository
  217. and thus limited in size to MAX_OBJECT_SIZE (20MiB).
  218. As one chunk list entry is ~40B, that means we can reference ~500.000 item
  219. metadata stream chunks per archive.
  220. Each item metadata stream chunk is ~128kiB (see hardcoded ITEMS_CHUNKER_PARAMS).
  221. So that means the whole item metadata stream is limited to ~64GiB chunks.
  222. If compression is used, the amount of storable metadata is bigger - by the
  223. compression factor.
  224. If the medium size of an item entry is 100B (small size file, no ACLs/xattrs),
  225. that means a limit of ~640 million files/directories per archive.
  226. If the medium size of an item entry is 2kB (~100MB size files or more
  227. ACLs/xattrs), the limit will be ~32 million files/directories per archive.
  228. If one tries to create an archive object bigger than MAX_OBJECT_SIZE, a fatal
  229. IntegrityError will be raised.
  230. A workaround is to create multiple archives with less items each, see
  231. also :issue:`1452`.
  232. .. _item:
  233. Items
  234. -----
  235. Each item represents a file, directory or other fs item and is stored as an
  236. ``item`` dictionary that contains:
  237. * path
  238. * list of data chunks (size: count * ~40B)
  239. * user
  240. * group
  241. * uid
  242. * gid
  243. * mode (item type + permissions)
  244. * source (for links)
  245. * rdev (for devices)
  246. * mtime, atime, ctime in nanoseconds
  247. * xattrs
  248. * acl
  249. * bsdfiles
  250. All items are serialized using msgpack and the resulting byte stream
  251. is fed into the same chunker algorithm as used for regular file data
  252. and turned into deduplicated chunks. The reference to these chunks is then added
  253. to the archive metadata. To achieve a finer granularity on this metadata
  254. stream, we use different chunker params for this chunker, which result in
  255. smaller chunks.
  256. A chunk is stored as an object as well, of course.
  257. .. _chunks:
  258. .. _chunker_details:
  259. Chunks
  260. ------
  261. The |project_name| chunker uses a rolling hash computed by the Buzhash_ algorithm.
  262. It triggers (chunks) when the last HASH_MASK_BITS bits of the hash are zero,
  263. producing chunks of 2^HASH_MASK_BITS Bytes on average.
  264. Buzhash is **only** used for cutting the chunks at places defined by the
  265. content, the buzhash value is **not** used as the deduplication criteria (we
  266. use a cryptographically strong hash/MAC over the chunk contents for this, the
  267. id_hash).
  268. ``borg create --chunker-params CHUNK_MIN_EXP,CHUNK_MAX_EXP,HASH_MASK_BITS,HASH_WINDOW_SIZE``
  269. can be used to tune the chunker parameters, the default is:
  270. - CHUNK_MIN_EXP = 19 (minimum chunk size = 2^19 B = 512 kiB)
  271. - CHUNK_MAX_EXP = 23 (maximum chunk size = 2^23 B = 8 MiB)
  272. - HASH_MASK_BITS = 21 (statistical medium chunk size ~= 2^21 B = 2 MiB)
  273. - HASH_WINDOW_SIZE = 4095 [B] (`0xFFF`)
  274. The buzhash table is altered by XORing it with a seed randomly generated once
  275. for the archive, and stored encrypted in the keyfile. This is to prevent chunk
  276. size based fingerprinting attacks on your encrypted repo contents (to guess
  277. what files you have based on a specific set of chunk sizes).
  278. For some more general usage hints see also ``--chunker-params``.
  279. .. _cache:
  280. Indexes / Caches
  281. ----------------
  282. The **files cache** is stored in ``cache/files`` and is used at backup time to
  283. quickly determine whether a given file is unchanged and we have all its chunks.
  284. The files cache is a key -> value mapping and contains:
  285. * key:
  286. - full, absolute file path id_hash
  287. * value:
  288. - file inode number
  289. - file size
  290. - file mtime_ns
  291. - list of file content chunk id hashes
  292. - age (0 [newest], 1, 2, 3, ..., BORG_FILES_CACHE_TTL - 1)
  293. To determine whether a file has not changed, cached values are looked up via
  294. the key in the mapping and compared to the current file attribute values.
  295. If the file's size, mtime_ns and inode number is still the same, it is
  296. considered to not have changed. In that case, we check that all file content
  297. chunks are (still) present in the repository (we check that via the chunks
  298. cache).
  299. If everything is matching and all chunks are present, the file is not read /
  300. chunked / hashed again (but still a file metadata item is written to the
  301. archive, made from fresh file metadata read from the filesystem). This is
  302. what makes borg so fast when processing unchanged files.
  303. If there is a mismatch or a chunk is missing, the file is read / chunked /
  304. hashed. Chunks already present in repo won't be transferred to repo again.
  305. The inode number is stored and compared to make sure we distinguish between
  306. different files, as a single path may not be unique across different
  307. archives in different setups.
  308. Not all filesystems have stable inode numbers. If that is the case, borg can
  309. be told to ignore the inode number in the check via --ignore-inode.
  310. The age value is used for cache management. If a file is "seen" in a backup
  311. run, its age is reset to 0, otherwise its age is incremented by one.
  312. If a file was not seen in BORG_FILES_CACHE_TTL backups, its cache entry is
  313. removed. See also: :ref:`always_chunking` and :ref:`a_status_oddity`
  314. The files cache is a python dictionary, storing python objects, which
  315. generates a lot of overhead.
  316. Borg can also work without using the files cache (saves memory if you have a
  317. lot of files or not much RAM free), then all files are assumed to have changed.
  318. This is usually much slower than with files cache.
  319. The **chunks cache** is stored in ``cache/chunks`` and is used to determine
  320. whether we already have a specific chunk, to count references to it and also
  321. for statistics.
  322. The chunks cache is a key -> value mapping and contains:
  323. * key:
  324. - chunk id_hash
  325. * value:
  326. - reference count
  327. - size
  328. - encrypted/compressed size
  329. The chunks cache is a hashindex, a hash table implemented in C and tuned for
  330. memory efficiency.
  331. The **repository index** is stored in ``repo/index.%d`` and is used to
  332. determine a chunk's location in the repository.
  333. The repo index is a key -> value mapping and contains:
  334. * key:
  335. - chunk id_hash
  336. * value:
  337. - segment (that contains the chunk)
  338. - offset (where the chunk is located in the segment)
  339. The repo index is a hashindex, a hash table implemented in C and tuned for
  340. memory efficiency.
  341. Hints are stored in a file (``repo/hints.%d``).
  342. It contains:
  343. * version
  344. * list of segments
  345. * compact
  346. hints and index can be recreated if damaged or lost using ``check --repair``.
  347. The chunks cache and the repository index are stored as hash tables, with
  348. only one slot per bucket, but that spreads the collisions to the following
  349. buckets. As a consequence the hash is just a start position for a linear
  350. search, and if the element is not in the table the index is linearly crossed
  351. until an empty bucket is found.
  352. When the hash table is filled to 75%, its size is grown. When it's
  353. emptied to 25%, its size is shrinked. So operations on it have a variable
  354. complexity between constant and linear with low factor, and memory overhead
  355. varies between 33% and 300%.
  356. .. _cache-memory-usage:
  357. Indexes / Caches memory usage
  358. -----------------------------
  359. Here is the estimated memory usage of |project_name| - it's complicated:
  360. chunk_count ~= total_file_size / 2 ^ HASH_MASK_BITS
  361. repo_index_usage = chunk_count * 40
  362. chunks_cache_usage = chunk_count * 44
  363. files_cache_usage = total_file_count * 240 + chunk_count * 80
  364. mem_usage ~= repo_index_usage + chunks_cache_usage + files_cache_usage
  365. = chunk_count * 164 + total_file_count * 240
  366. Due to the hashtables, the best/usual/worst cases for memory allocation can
  367. be estimated like that:
  368. mem_allocation = mem_usage / load_factor # l_f = 0.25 .. 0.75
  369. mem_allocation_peak = mem_allocation * (1 + growth_factor) # g_f = 1.1 .. 2
  370. All units are Bytes.
  371. It is assuming every chunk is referenced exactly once (if you have a lot of
  372. duplicate chunks, you will have less chunks than estimated above).
  373. It is also assuming that typical chunk size is 2^HASH_MASK_BITS (if you have
  374. a lot of files smaller than this statistical medium chunk size, you will have
  375. more chunks than estimated above, because 1 file is at least 1 chunk).
  376. If a remote repository is used the repo index will be allocated on the remote side.
  377. The chunks cache, files cache and the repo index are all implemented as hash
  378. tables. A hash table must have a significant amount of unused entries to be
  379. fast - the so-called load factor gives the used/unused elements ratio.
  380. When a hash table gets full (load factor getting too high), it needs to be
  381. grown (allocate new, bigger hash table, copy all elements over to it, free old
  382. hash table) - this will lead to short-time peaks in memory usage each time this
  383. happens. Usually does not happen for all hashtables at the same time, though.
  384. For small hash tables, we start with a growth factor of 2, which comes down to
  385. ~1.1x for big hash tables.
  386. E.g. backing up a total count of 1 Mi (IEC binary prefix i.e. 2^20) files with a total size of 1TiB.
  387. a) with ``create --chunker-params 10,23,16,4095`` (custom, like borg < 1.0 or attic):
  388. mem_usage = 2.8GiB
  389. b) with ``create --chunker-params 19,23,21,4095`` (default):
  390. mem_usage = 0.31GiB
  391. .. note:: There is also the ``--no-files-cache`` option to switch off the files cache.
  392. You'll save some memory, but it will need to read / chunk all the files as
  393. it can not skip unmodified files then.
  394. Encryption
  395. ----------
  396. .. seealso:: The :ref:`borgcrypto` section for an in-depth review.
  397. AES_-256 is used in CTR mode (so no need for padding). A 64 bit initialization
  398. vector is used, a MAC is computed on the encrypted chunk
  399. and both are stored in the chunk. Encryption and MAC use two different keys.
  400. Each chunk consists of ``TYPE(1)`` + ``MAC(32)`` + ``NONCE(8)`` + ``CIPHERTEXT``:
  401. .. figure:: encryption.png
  402. In AES-CTR mode you can think of the IV as the start value for the counter.
  403. The counter itself is incremented by one after each 16 byte block.
  404. The IV/counter is not required to be random but it must NEVER be reused.
  405. So to accomplish this |project_name| initializes the encryption counter to be
  406. higher than any previously used counter value before encrypting new data.
  407. To reduce payload size, only 8 bytes of the 16 bytes nonce is saved in the
  408. payload, the first 8 bytes are always zeros. This does not affect security but
  409. limits the maximum repository capacity to only 295 exabytes (2**64 * 16 bytes).
  410. Encryption keys (and other secrets) are kept either in a key file on the client
  411. ('keyfile' mode) or in the repository config on the server ('repokey' mode).
  412. In both cases, the secrets are generated from random and then encrypted by a
  413. key derived from your passphrase (this happens on the client before the key
  414. is stored into the keyfile or as repokey).
  415. The passphrase is passed through the ``BORG_PASSPHRASE`` environment variable
  416. or prompted for interactive usage.
  417. .. _key_files:
  418. Key files
  419. ---------
  420. .. seealso:: The :ref:`key_encryption` section for an in-depth review of the key encryption.
  421. When initialized with the ``init -e keyfile`` command, |project_name|
  422. needs an associated file in ``$HOME/.config/borg/keys`` to read and write
  423. the repository. The format is based on msgpack_, base64 encoding and
  424. PBKDF2_ SHA256 hashing, which is then encoded again in a msgpack_.
  425. The same data structure is also used in the "repokey" modes, which store
  426. it in the repository in the configuration file.
  427. The internal data structure is as follows:
  428. version
  429. currently always an integer, 1
  430. repository_id
  431. the ``id`` field in the ``config`` ``INI`` file of the repository.
  432. enc_key
  433. the key used to encrypt data with AES (256 bits)
  434. enc_hmac_key
  435. the key used to HMAC the encrypted data (256 bits)
  436. id_key
  437. the key used to HMAC the plaintext chunk data to compute the chunk's id
  438. chunk_seed
  439. the seed for the buzhash chunking table (signed 32 bit integer)
  440. These fields are packed using msgpack_. The utf-8 encoded passphrase
  441. is processed with PBKDF2_ (SHA256_, 100000 iterations, random 256 bit salt)
  442. to derive a 256 bit key encryption key (KEK).
  443. A `HMAC-SHA256`_ checksum of the packed fields is generated with the KEK,
  444. then the KEK is also used to encrypt the same packed fields using AES-CTR.
  445. The result is stored in a another msgpack_ formatted as follows:
  446. version
  447. currently always an integer, 1
  448. salt
  449. random 256 bits salt used to process the passphrase
  450. iterations
  451. number of iterations used to process the passphrase (currently 100000)
  452. algorithm
  453. the hashing algorithm used to process the passphrase and do the HMAC
  454. checksum (currently the string ``sha256``)
  455. hash
  456. HMAC-SHA256 of the *plaintext* of the packed fields.
  457. data
  458. The encrypted, packed fields.
  459. The resulting msgpack_ is then encoded using base64 and written to the
  460. key file, wrapped using the standard ``textwrap`` module with a header.
  461. The header is a single line with a MAGIC string, a space and a hexadecimal
  462. representation of the repository id.
  463. Compression
  464. -----------
  465. |project_name| supports the following compression methods:
  466. - none (no compression, pass through data 1:1)
  467. - lz4 (low compression, but super fast)
  468. - zlib (level 0-9, level 0 is no compression [but still adding zlib overhead],
  469. level 1 is low, level 9 is high compression)
  470. - lzma (level 0-9, level 0 is low, level 9 is high compression).
  471. Speed: none > lz4 > zlib > lzma
  472. Compression: lzma > zlib > lz4 > none
  473. Be careful, higher zlib and especially lzma compression levels might take a
  474. lot of resources (CPU and memory).
  475. The overall speed of course also depends on the speed of your target storage.
  476. If that is slow, using a higher compression level might yield better overall
  477. performance. You need to experiment a bit. Maybe just watch your CPU load, if
  478. that is relatively low, increase compression until 1 core is 70-100% loaded.
  479. Even if your target storage is rather fast, you might see interesting effects:
  480. while doing no compression at all (none) is a operation that takes no time, it
  481. likely will need to store more data to the storage compared to using lz4.
  482. The time needed to transfer and store the additional data might be much more
  483. than if you had used lz4 (which is super fast, but still might compress your
  484. data about 2:1). This is assuming your data is compressible (if you backup
  485. already compressed data, trying to compress them at backup time is usually
  486. pointless).
  487. Compression is applied after deduplication, thus using different compression
  488. methods in one repo does not influence deduplication.
  489. See ``borg create --help`` about how to specify the compression level and its default.
  490. Lock files
  491. ----------
  492. |project_name| uses locks to get (exclusive or shared) access to the cache and
  493. the repository.
  494. The locking system is based on creating a directory `lock.exclusive` (for
  495. exclusive locks). Inside the lock directory, there is a file indicating
  496. hostname, process id and thread id of the lock holder.
  497. There is also a json file `lock.roster` that keeps a directory of all shared
  498. and exclusive lockers.
  499. If the process can create the `lock.exclusive` directory for a resource, it has
  500. the lock for it. If creation fails (because the directory has already been
  501. created by some other process), lock acquisition fails.
  502. The cache lock is usually in `~/.cache/borg/REPOID/lock.*`.
  503. The repository lock is in `repository/lock.*`.
  504. In case you run into troubles with the locks, you can use the ``borg break-lock``
  505. command after you first have made sure that no |project_name| process is
  506. running on any machine that accesses this resource. Be very careful, the cache
  507. or repository might get damaged if multiple processes use it at the same time.