2
2
mirror of https://github.com/octoleo/restic.git synced 2024-11-23 13:17:42 +00:00
restic/doc/Design.md

490 lines
21 KiB
Markdown
Raw Normal View History

2015-04-07 18:09:25 +00:00
This document gives a high-level overview of the design and repository layout
of the restic backup program.
2015-01-02 17:43:59 +00:00
2015-04-09 18:48:32 +00:00
Terminology
===========
This section introduces terminology used in this document.
2015-08-21 20:08:10 +00:00
*Repository*: All data produced during a backup is sent to and stored in a
repository in a structured form, for example in a file system hierarchy with
several subdirectories. A repository implementation must be able to fulfill a
2015-04-09 18:48:32 +00:00
number of operations, e.g. list the contents.
*Blob*: A Blob combines a number of data bytes with identifying information
2015-08-22 13:08:35 +00:00
like the SHA-256 hash of the data and its length.
2015-04-09 18:48:32 +00:00
2015-08-21 20:08:10 +00:00
*Pack*: A Pack combines one or more Blobs, e.g. in a single file.
2015-04-09 18:48:32 +00:00
*Snapshot*: A Snapshot stands for the state of a file or directory that has
been backed up at some point in time. The state here means the content and meta
data like the name and modification time for the file or the directory and its
contents.
2015-05-04 18:39:07 +00:00
*Storage ID*: A storage ID is the SHA-256 hash of the content stored in the
2015-08-21 20:08:10 +00:00
repository. This ID is required in order to load the file from the repository.
2015-05-03 13:00:26 +00:00
2015-01-02 21:45:02 +00:00
Repository Format
=================
2015-01-02 17:43:59 +00:00
2015-04-07 17:57:06 +00:00
All data is stored in a restic repository. A repository is able to store data
2015-05-03 13:00:26 +00:00
of several different types, which can later be requested based on an ID. This
2015-05-04 18:39:07 +00:00
so-called "storage ID" is the SHA-256 hash of the content of a file. All files
in a repository are only written once and never modified afterwards. This
2015-05-03 13:00:26 +00:00
allows accessing and even writing to the repository with multiple clients in
parallel. Only the delete operation removes data from the repository.
2015-01-03 14:24:47 +00:00
At the time of writing, the only implemented repository type is based on
directories and files. Such repositories can be accessed locally on the same
2015-08-21 20:08:10 +00:00
system or via the integrated SFTP client (or any other storage back end).
The directory layout is the same for both access methods.
This repository type is described in the following section.
2015-01-03 14:24:47 +00:00
2015-05-04 18:39:07 +00:00
Repositories consist of several directories and a file called `config`. For
2015-05-03 13:00:26 +00:00
all other files stored in the repository, the name for the file is the lower
case hexadecimal representation of the storage ID, which is the SHA-256 hash of
2015-08-21 20:08:10 +00:00
the file's contents. This allows for easy verification of files for accidental
modifications, like disk read errors, by simply running the program `sha256sum`
2015-05-03 13:00:26 +00:00
and comparing its output to the file name. If the prefix of a filename is
unique amongst all the other files in the same directory, the prefix may be
used instead of the complete filename.
2015-08-21 20:08:10 +00:00
Apart from the files stored within the `keys` directory, all files are encrypted
2015-05-03 13:00:26 +00:00
with AES-256 in counter mode (CTR). The integrity of the encrypted data is
secured by a Poly1305-AES message authentication code (sometimes also referred
to as a "signature").
2015-01-03 14:24:47 +00:00
In the first 16 bytes of each encrypted file the initialisation vector (IV) is
2015-04-30 16:09:08 +00:00
stored. It is followed by the encrypted data and completed by the 16 byte
MAC. The format is: `IV || CIPHERTEXT || MAC`. The complete encryption
2015-05-03 13:00:26 +00:00
overhead is 32 bytes. For each file, a new random IV is selected.
The file `config` is encrypted this way and contains a JSON document like the
following:
{
"version": 1,
"id": "5956a3f67a6230d4a92cefb29529f10196c7d92582ec305fd71ff6d331d6271b",
"chunker_polynomial": "25b468838dcb75"
}
After decryption, restic first checks that the version field contains a version
number that it understands, otherwise it aborts. At the moment, the version is
expected to be 1. The field `id` holds a unique ID which consists of 32
random bytes, encoded in hexadecimal. This uniquely identifies the repository,
regardless if it is accessed via SFTP or locally. The field
`chunker_polynomial` contains a parameter that is used for splitting large
files into smaller chunks (see below).
2015-01-02 17:43:59 +00:00
2015-05-03 13:00:26 +00:00
The basic layout of a sample restic repository is shown here:
2015-01-02 17:43:59 +00:00
/tmp/restic-repo
2015-05-03 13:00:26 +00:00
├── config
2015-01-02 17:43:59 +00:00
├── data
2015-04-26 13:36:49 +00:00
│ ├── 21
│ │ └── 2159dd48f8a24f33c307b750592773f8b71ff8d11452132a7b2e2a6a01611be1
│ ├── 32
│ │ └── 32ea976bc30771cebad8285cd99120ac8786f9ffd42141d452458089985043a5
2015-01-02 17:43:59 +00:00
│ ├── 59
│ │ └── 59fe4bcde59bd6222eba87795e35a90d82cd2f138a27b6835032b7b58173a426
│ ├── 73
│ │ └── 73d04e6125cf3c28a299cc2f3cca3b78ceac396e4fcf9575e34536b26782413c
│ [...]
2015-04-08 19:42:13 +00:00
├── index
2015-04-26 13:36:49 +00:00
│ ├── c38f5fb68307c6a3e3aa945d556e325dc38f5fb68307c6a3e3aa945d556e325d
│ └── ca171b1b7394d90d330b265d90f506f9984043b342525f019788f97e745c71fd
2015-01-02 17:43:59 +00:00
├── keys
│ └── b02de829beeb3c01a63e6b25cbd421a98fef144f03b9a02e46eff9e2ca3f0bd7
├── locks
├── snapshots
│ └── 22a5af1bdc6e616f8a29579458c49627e01b32210d09adb288d1ecda7c5711ec
2015-05-03 13:00:26 +00:00
└── tmp
2015-01-02 17:43:59 +00:00
2015-01-02 21:45:02 +00:00
A repository can be initialized with the `restic init` command, e.g.:
$ restic -r /tmp/restic-repo init
2015-01-02 21:45:02 +00:00
2015-04-09 18:48:32 +00:00
Pack Format
2015-04-08 19:42:13 +00:00
-----------
2015-05-03 13:00:26 +00:00
All files in the repository except Key and Pack files just contain raw data,
stored as `IV || Ciphertext || MAC`. Pack files may contain one or more Blobs
of data.
2015-04-08 19:42:13 +00:00
2015-05-03 13:00:26 +00:00
A Pack's structure is as follows:
2015-04-08 19:42:13 +00:00
2015-04-26 13:36:49 +00:00
EncryptedBlob1 || ... || EncryptedBlobN || EncryptedHeader || Header_Length
2015-04-08 19:42:13 +00:00
2015-05-03 13:00:26 +00:00
At the end of the Pack file is a header, which describes the content. The
header is encrypted and authenticated. `Header_Length` is the length of the
encrypted header encoded as a four byte integer in little-endian encoding.
Placing the header at the end of a file allows writing the blobs in a
continuous stream as soon as they are read during the backup phase. This
reduces code complexity and avoids having to re-write a file once the pack is
complete and the content and length of the header is known.
2015-04-08 19:42:13 +00:00
2015-04-30 16:09:08 +00:00
All the blobs (`EncryptedBlob1`, `EncryptedBlobN` etc.) are authenticated and
2015-04-26 13:36:49 +00:00
encrypted independently. This enables repository reorganisation without having
to touch the encrypted Blobs. In addition it also allows efficient indexing,
for only the header needs to be read in order to find out which Blobs are
2015-04-30 16:09:08 +00:00
contained in the Pack. Since the header is authenticated, authenticity of the
header can be checked without having to read the complete Pack.
2015-04-08 19:42:13 +00:00
2015-04-09 18:48:32 +00:00
After decryption, a Pack's header consists of the following elements:
2015-04-08 19:42:13 +00:00
2015-04-26 13:36:49 +00:00
Type_Blob1 || Length(EncryptedBlob1) || Hash(Plaintext_Blob1) ||
2015-04-08 19:42:13 +00:00
[...]
2015-04-26 13:36:49 +00:00
Type_BlobN || Length(EncryptedBlobN) || Hash(Plaintext_Blobn) ||
2015-04-08 19:42:13 +00:00
2015-04-09 18:48:32 +00:00
This is enough to calculate the offsets for all the Blobs in the Pack. Length
2015-04-26 13:36:49 +00:00
is the length of a Blob as a four byte integer in little-endian format. The
type field is a one byte field and labels the content of a blob according to
the following table:
Type | Meaning
-----|---------
0 | data
1 | tree
All other types are invalid, more types may be added in the future.
For reconstructing the index or parsing a pack without an index, first the last
four bytes must be read in order to find the length of the header. Afterwards,
the header can be read and parsed, which yields all plaintext hashes, types,
offsets and lengths of all included blobs.
2015-04-08 19:42:13 +00:00
Indexing
--------
2015-04-09 18:48:32 +00:00
Index files contain information about Data and Tree Blobs and the Packs they
are contained in and store this information in the repository. When the local
cached index is not accessible any more, the index files can be downloaded and
2015-04-30 16:09:08 +00:00
used to reconstruct the index. The files are encrypted and authenticated like
Data and Tree Blobs, so the outer structure is `IV || Ciphertext || MAC` again.
The plaintext consists of a JSON document like the following:
2015-04-26 13:36:49 +00:00
2015-05-03 13:00:32 +00:00
{
2015-07-25 22:40:00 +00:00
"supersedes": [
2015-05-03 13:00:32 +00:00
"ed54ae36197f4745ebc4b54d10e0f623eaaaedd03013eb7ae90df881b7781452"
],
"packs": [
2015-04-26 13:36:49 +00:00
{
2015-05-03 13:00:32 +00:00
"id": "73d04e6125cf3c28a299cc2f3cca3b78ceac396e4fcf9575e34536b26782413c",
"blobs": [
{
"id": "3ec79977ef0cf5de7b08cd12b874cd0f62bbaf7f07f3497a5b1bbcc8cb39b1ce",
"type": "data",
"offset": 0,
"length": 25
},{
"id": "9ccb846e60d90d4eb915848add7aa7ea1e4bbabfc60e573db9f7bfb2789afbae",
"type": "tree",
"offset": 38,
"length": 100
},
{
"id": "d3dc577b4ffd38cc4b32122cabf8655a0223ed22edfd93b353dc0c3f2b0fdf66",
"type": "data",
"offset": 150,
"length": 123
}
]
}, [...]
2015-04-26 13:36:49 +00:00
]
2015-05-03 13:00:32 +00:00
}
This JSON document lists Packs and the blobs contained therein. In this
example, the Pack `73d04e61` contains two data Blobs and one Tree blob, the
plaintext hashes are listed afterwards.
2015-04-26 13:36:49 +00:00
2015-07-25 22:40:00 +00:00
The field `supersedes` lists the storage IDs of index files that have been
2015-05-03 13:00:32 +00:00
replaced with the current index file. This happens when index files are
2015-07-25 22:40:00 +00:00
repacked, for example when old snapshots are removed and Packs are recombined.
2015-04-26 13:36:49 +00:00
There may be an arbitrary number of index files, containing information on
non-disjoint sets of Packs. The number of packs described in a single file is
2015-05-03 13:00:26 +00:00
chosen so that the file size is kept below 8 MiB.
2015-04-08 19:42:13 +00:00
Keys, Encryption and MAC
------------------------
2015-01-02 21:45:02 +00:00
2015-03-22 20:26:14 +00:00
All data stored by restic in the repository is encrypted with AES-256 in
2015-04-30 16:09:08 +00:00
counter mode and authenticated using Poly1305-AES. For encrypting new data first
16 bytes are read from a cryptographically secure pseudorandom number generator
as a random nonce. This is used both as the IV for counter mode and the nonce
for Poly1305. This operation needs three keys: A 32 byte for AES-256 for
2015-03-22 20:26:14 +00:00
encryption, a 16 byte AES key and a 16 byte key for Poly1305. For details see
2015-03-22 21:46:38 +00:00
the original paper [The Poly1305-AES message-authentication
2015-03-22 20:29:19 +00:00
code](http://cr.yp.to/mac/poly1305-20050329.pdf) by Dan Bernstein.
2015-04-30 16:09:08 +00:00
The data is then encrypted with AES-256 and afterwards a message authentication
code (MAC) is computed over the ciphertext, everything is then stored as
IV || CIPHERTEXT || MAC.
2015-03-22 20:26:14 +00:00
2015-01-03 14:24:47 +00:00
The directory `keys` contains key files. These are simple JSON documents which
2015-04-30 16:09:08 +00:00
contain all data that is needed to derive the repository's master encryption and
message authentication keys from a user's password. The JSON document from the
repository can be pretty-printed for example by using the Python module `json`
(shortened to increase readability):
2015-01-02 17:43:59 +00:00
$ python -mjson.tool /tmp/restic-repo/keys/b02de82*
{
"hostname": "kasimir",
"username": "fd0"
"kdf": "scrypt",
"N": 65536,
"r": 8,
"p": 1,
"created": "2015-01-02T18:10:13.48307196+01:00",
"data": "tGwYeKoM0C4j4/9DFrVEmMGAldvEn/+iKC3te/QE/6ox/V4qz58FUOgMa0Bb1cIJ6asrypCx/Ti/pRXCPHLDkIJbNYd2ybC+fLhFIJVLCvkMS+trdywsUkglUbTbi+7+Ldsul5jpAj9vTZ25ajDc+4FKtWEcCWL5ICAOoTAxnPgT+Lh8ByGQBH6KbdWabqamLzTRWxePFoYuxa7yXgmj9A==",
"salt": "uW4fEI1+IOzj7ED9mVor+yTSJFd68DGlGOeLgJELYsTU5ikhG/83/+jGd4KKAaQdSrsfzrdOhAMftTSih5Ux6w==",
}
2015-01-03 14:24:47 +00:00
When the repository is opened by restic, the user is prompted for the
repository password. This is then used with `scrypt`, a key derivation function
(KDF), and the supplied parameters (`N`, `r`, `p` and `salt`) to derive 64 key
bytes. The first 32 bytes are used as the encryption key (for AES-256) and the
2015-04-30 16:09:08 +00:00
last 32 bytes are used as the message authentication key (for Poly1305-AES).
These last 32 bytes are divided into a 16 byte AES key `k` followed by 16 bytes
2015-08-22 21:03:25 +00:00
of secret key `r`. The key `r` is then masked for use with Poly1305 (see the
2015-04-30 16:09:08 +00:00
paper for details).
2015-08-22 21:03:25 +00:00
Those message authentication keys (`k` and `r`) are used to compute a MAC over
the bytes contained in the JSON field `data` (after removing the Base64
encoding and not including the last 32 byte). If the password is incorrect or
the key file has been tampered with, the computed MAC will not match the last
16 bytes of the data, and restic exits with an error. Otherwise, the data is
decrypted with the encryption key derived from `scrypt`. This yields a JSON
document which contains the master encryption and message authentication keys
for this repository (encoded in Base64). The command `restic cat masterkey` can
be used as follows to decrypt and pretty-print the master key:
$ restic -r /tmp/restic-repo cat masterkey
{
2015-04-30 16:09:08 +00:00
"mac": {
"k": "evFWd9wWlndL9jc501268g==",
"r": "E9eEDnSJZgqwTOkDtOp+Dw=="
},
2015-04-07 18:09:25 +00:00
"encrypt": "UQCqa0lKZ94PygPxMRqkePTZnHRYh1k1pX2k2lM2v3Q=",
}
2015-04-30 16:09:08 +00:00
All data in the repository is encrypted and authenticated with these master keys.
For encryption, the AES-256 algorithm in Counter mode is used. For message
authentication, Poly1305-AES is used as described above.
2015-01-02 21:45:02 +00:00
A repository can have several different passwords, with a key file for each.
This way, the password can be changed without having to re-encrypt all data.
Snapshots
---------
2015-01-02 17:43:59 +00:00
2015-01-03 14:24:47 +00:00
A snapshots represents a directory with all files and sub-directories at a
given point in time. For each backup that is made, a new snapshot is created. A
2015-03-02 08:56:56 +00:00
snapshot is a JSON document that is stored in an encrypted file below the
2015-05-04 18:39:07 +00:00
directory `snapshots` in the repository. The filename is the storage ID. This
string is unique and used within restic to uniquely identify a snapshot.
2015-01-02 21:45:02 +00:00
2015-01-03 14:24:47 +00:00
The command `restic cat snapshot` can be used as follows to decrypt and
pretty-print the contents of a snapshot file:
2015-01-02 21:45:02 +00:00
$ restic -r /tmp/restic-repo cat snapshot 22a5af1b
2015-04-24 23:43:27 +00:00
enter password for repository:
2015-01-02 21:45:02 +00:00
{
"time": "2015-01-02T18:10:50.895208559+01:00",
2015-04-08 19:42:13 +00:00
"tree": "2da81727b6585232894cfbb8f8bdab8d1eccd3d8f7c92bc934d62e62e618ffdf",
2015-01-02 21:45:02 +00:00
"dir": "/tmp/testdata",
"hostname": "kasimir",
"username": "fd0",
"uid": 1000,
"gid": 100
}
2015-01-03 14:24:47 +00:00
Here it can be seen that this snapshot represents the contents of the directory
2015-01-17 15:57:16 +00:00
`/tmp/testdata`. The most important field is `tree`.
2015-01-02 21:45:02 +00:00
2015-01-03 14:24:47 +00:00
All content within a restic repository is referenced according to its SHA-256
2015-04-09 18:48:32 +00:00
hash. Before saving, each file is split into variable sized Blobs of data. The
SHA-256 hashes of all Blobs are saved in an ordered list which then represents
2015-01-17 15:57:16 +00:00
the content of the file.
2015-01-02 21:45:02 +00:00
2015-05-04 18:39:07 +00:00
In order to relate these plaintext hashes to the actual location within a Pack
2015-05-03 13:00:26 +00:00
file , an index is used. If the index is not available, the header of all data
Blobs can be read.
2015-01-02 21:45:02 +00:00
Trees and Data
--------------
2015-01-17 15:57:16 +00:00
A snapshot references a tree by the SHA-256 hash of the JSON string
2015-08-22 13:08:35 +00:00
representation of its contents. Trees and data are saved in pack files in a
subdirectory of the directory `data`.
2015-01-02 21:45:02 +00:00
The command `restic cat tree` can be used to inspect the tree referenced above:
2015-01-17 15:57:16 +00:00
$ restic -r /tmp/restic-repo cat tree b8138ab08a4722596ac89c917827358da4672eac68e3c03a8115b88dbf4bfb59
2015-04-24 23:43:27 +00:00
enter password for repository:
2015-01-17 15:57:16 +00:00
{
"nodes": [
{
"name": "testdata",
"type": "dir",
"mode": 493,
"mtime": "2014-12-22T14:47:59.912418701+01:00",
"atime": "2014-12-06T17:49:21.748468803+01:00",
"ctime": "2014-12-22T14:47:59.912418701+01:00",
"uid": 1000,
"gid": 100,
"user": "fd0",
"inode": 409704562,
"content": null,
"subtree": "b26e315b0988ddcd1cee64c351d13a100fedbc9fdbb144a67d1b765ab280b4dc"
}
]
}
A tree contains a list of entries (in the field `nodes`) which contain meta
data like a name and timestamps. When the entry references a directory, the
2015-05-03 13:00:26 +00:00
field `subtree` contains the plain text ID of another tree object.
2015-01-17 15:57:16 +00:00
When the command `restic cat tree` is used, the storage hash is needed to print
a tree. The tree referenced above can be dumped as follows:
$ restic -r /tmp/restic-repo cat tree 8b238c8811cc362693e91a857460c78d3acf7d9edb2f111048691976803cf16e
2015-04-24 23:43:27 +00:00
enter password for repository:
2015-01-17 15:57:16 +00:00
{
"nodes": [
{
"name": "testfile",
"type": "file",
"mode": 420,
"mtime": "2014-12-06T17:50:23.34513538+01:00",
"atime": "2014-12-06T17:50:23.338468713+01:00",
"ctime": "2014-12-06T17:50:23.34513538+01:00",
"uid": 1000,
"gid": 100,
"user": "fd0",
"inode": 416863351,
"size": 1234,
"links": 1,
"content": [
"50f77b3b4291e8411a027b9f9b9e64658181cc676ce6ba9958b95f268cb1109d"
]
},
[...]
]
}
2015-01-02 21:45:02 +00:00
2015-01-17 15:57:16 +00:00
This tree contains a file entry. This time, the `subtree` field is not present
2015-04-08 19:42:13 +00:00
and the `content` field contains a list with one plain text SHA-256 hash.
2015-01-02 21:45:02 +00:00
2015-01-17 15:57:16 +00:00
The command `restic cat data` can be used to extract and decrypt data given a
2015-05-04 18:39:07 +00:00
plaintext ID, e.g. for the data mentioned above:
2015-01-02 21:45:02 +00:00
2015-05-04 18:39:07 +00:00
$ restic -r /tmp/restic-repo cat blob 50f77b3b4291e8411a027b9f9b9e64658181cc676ce6ba9958b95f268cb1109d | sha256sum
2015-04-24 23:43:27 +00:00
enter password for repository:
2015-01-02 21:45:02 +00:00
50f77b3b4291e8411a027b9f9b9e64658181cc676ce6ba9958b95f268cb1109d -
2015-01-17 15:57:16 +00:00
As can be seen from the output of the program `sha256sum`, the hash matches the
plaintext hash from the map included in the tree above, so the correct data has
been returned.
2015-01-02 17:43:59 +00:00
2015-06-24 16:17:01 +00:00
Locks
-----
2015-06-27 11:57:52 +00:00
The restic repository structure is designed in a way that allows parallel
access of multiple instance of restic and even parallel writes. However, there
are some functions that work more efficient or even require exclusive access of
the repository. In order to implement these functions, restic processes are
required to create a lock on the repository before doing anything.
2015-06-24 16:17:01 +00:00
2015-06-27 11:57:52 +00:00
Locks come in two types: Exclusive and non-exclusive locks. At most one
process can have an exclusive lock on the repository, and during that time
2015-08-21 20:08:10 +00:00
there must not be any other locks (exclusive and non-exclusive). There may be
2015-06-27 11:57:52 +00:00
multiple non-exclusive locks in parallel.
A lock is a file in the subdir `locks` whose filename is the storage ID of
the contents. It is encrypted and authenticated the same way as other files
in the repository and contains the following JSON structure:
{
"time": "2015-06-27T12:18:51.759239612+02:00",
"exclusive": false,
"hostname": "kasimir",
"username": "fd0",
"pid": 13607,
"uid": 1000,
"gid": 100
}
The field `exclusive` defines the type of lock. When a new lock is to be
created, restic checks all locks in the repository. When a lock is found, it
is tested if the lock is stale, which is the case for locks with timestamps
older than 30 minutes. If the lock was created on the same machine, even for
younger locks it is tested whether the process is still alive by sending a
signal to it. If that fails, restic assumes that the process is dead and
considers the lock to be stale.
When a new lock is to be created and no other conflicting locks are
detected, restic creates a new lock, waits, and checks if other locks
appeared in the repository. Depending on the type of the other locks and the
lock to be created, restic either continues or fails.
2015-06-24 16:17:01 +00:00
2015-01-02 17:43:59 +00:00
Backups and Deduplication
=========================
2015-04-26 09:26:57 +00:00
For creating a backup, restic scans the source directory for all files,
2015-01-03 14:24:47 +00:00
sub-directories and other entries. The data from each file is split into
2015-04-09 18:48:32 +00:00
variable length Blobs cut at offsets defined by a sliding window of 64 byte.
2015-01-03 14:24:47 +00:00
The implementation uses Rabin Fingerprints for implementing this Content
2015-05-03 13:00:26 +00:00
Defined Chunking (CDC). An irreducible polynomial is selected at random and
saved in the file `config` when a repository is initialized, so that watermark
attacks are much harder.
2015-01-03 14:24:47 +00:00
2015-04-09 18:48:32 +00:00
Files smaller than 512 KiB are not split, Blobs are of 512 KiB to 8 MiB in
size. The implementation aims for 1 MiB Blob size on average.
2015-01-03 14:24:47 +00:00
2015-04-09 18:48:32 +00:00
For modified files, only modified Blobs have to be saved in a subsequent
2015-01-03 14:24:47 +00:00
backup. This even works if bytes are inserted or removed at arbitrary positions
within the file.
2015-01-02 17:43:59 +00:00
2015-01-03 14:28:33 +00:00
Threat Model
============
The design goals for restic include being able to securely store backups in a
location that is not completely trusted, e.g. a shared system where others can
potentially access the files or (in the case of the system administrator) even
modify or delete them.
General assumptions:
* The host system a backup is created on is trusted. This is the most basic
requirement, and essential for creating trustworthy backups.
The restic backup program guarantees the following:
2015-08-22 21:03:25 +00:00
* Accessing the unencrypted content of stored files and metadata should not
2015-01-03 16:05:37 +00:00
be possible without a password for the repository. Everything except the
2015-08-22 21:03:25 +00:00
metadata included for informational purposes in the key files is encrypted and
2015-08-22 13:08:35 +00:00
authenticated.
2015-01-03 14:28:33 +00:00
* Modifications (intentional or unintentional) can be detected automatically
on several layers:
1. For all accesses of data stored in the repository it is checked whether
the cryptographic hash of the contents matches the storage ID (the
file's name). This way, modifications (bad RAM, broken harddisk) can be
detected easily.
2015-04-30 16:09:08 +00:00
2. Before decrypting any data, the MAC on the encrypted data is
checked. If there has been a modification, the MAC check will
2015-01-03 14:28:33 +00:00
fail. This step happens even before the data is decrypted, so data that
has been tampered with is not decrypted at all.
However, the restic backup program is not designed to protect against attackers
deleting files at the storage location. There is nothing that can be done about
this. If this needs to be guaranteed, get a secure location without any access
from third parties. If you assume that attackers have write access to your
files at the storage location, attackers are able to figure out (e.g. based on
the timestamps of the stored files) which files belong to what snapshot. When
only these files are deleted, the particular snapshot vanished and all
snapshots depending on data that has been added in the snapshot cannot be
restored completely. Restic is not designed to detect this attack.