Run 1Password Backup

How to export and encrypt your 1Password vaults for inclusion in borgmatic backups. Run this periodically from your local machine (Gilbert).

Prerequisites

  • 1Password desktop app running (for the vault export)
  • op, age, openssl, ssh, and scp installed locally
  • SSH access to indri
  • The op CLI signed in (biometric unlock)

Procedure

1. Export Vaults From 1Password

  1. Open the 1Password desktop app
  2. File > Export > All Vaults
  3. Choose 1PUX format
  4. Save to ~/Documents/1Password-export.1pux

2. Run the Backup Task

mise run op-backup

Or, if you saved the export to a non-default location:

mise run op-backup ~/path/to/export.1pux

The task will:

  1. Prompt for the .1pux path if not provided
  2. Fetch your master password and secret key from 1Password (triggers biometric)
  3. Generate a temporary age key pair
  4. Encrypt the .1pux with the age public key
  5. Encrypt the age private key with OpenSSL AES-256-CBC (passphrase: {master_password}:{secret_key})
  6. SCP both encrypted files to indri:/Users/erichblume/Documents/1password-backup/
  7. Clean up old backups on indri (keeps last 3 sets)
  8. Delete the plaintext .1pux from Gilbert

No cleanup needed — the script automatically deletes the plaintext .1pux from Gilbert and shreds the temporary encryption keys.

3. Verify

After the script completes, confirm the files landed on indri:

ssh indri 'ls -lh /Users/erichblume/Documents/1password-backup/'

You should see a .age file (~30-45 MB) and a .key.enc file (~200 bytes) with today’s timestamp.

What Happens Next

Borgmatic picks up the encrypted files during its daily 2:00 AM backup run, archiving them to both sifaka (local NAS) and BorgBase (offsite). No further action needed.