Built to protect your
backup infrastructure
Borg Backup Server is designed with defense in depth — from append-only repositories and zero-trust networking to AES-256 encryption and OWASP-compliant web security.
Append-only mode
stops ransomware
Every agent connects via SSH with forced commands that restrict it to borg serve --append-only. Agents can create new archives but can never delete, modify, or overwrite existing ones.
- Agents are restricted to their own directory — no cross-client access
- No shell access — agents cannot execute arbitrary commands
- Only the server can prune old archives via retention policies
- A fully compromised client cannot destroy existing backups
command="borg serve --append-only \
--restrict-to-path /var/bbs/home/{id}",
no-pty,no-agent-forwarding,
no-port-forwarding,no-X11-forwarding
ssh-ed25519 AAAA... bbs-agent
Server never connects
to your machines
BBS operates on a pull model — agents poll the server for work over HTTPS. The server never initiates SSH connections to clients and holds no credentials for client systems.
- No inbound firewall rules needed on client machines — works behind NAT & firewalls
- Compromising the backup server gives zero access to production infrastructure
- Eliminates lateral movement from backup server to clients
- Server stores no SSH keys, passwords, or tokens for client machines
Multiple layers of protection
From encrypted credentials to rate-limited APIs, every layer is hardened independently.
AES-256-GCM Encryption
Repository passphrases, SSH private keys, and TOTP secrets are encrypted in the database using AES-256-GCM with a server-specific application key.
Agent Isolation
Each agent gets a unique API key, dedicated SSH user, and restricted home directory. Agents can only access their own jobs and repositories.
OWASP Web Security
Parameterized queries (PDO), CSRF tokens with constant-time comparison, XSS escaping, command injection prevention via escapeshellarg, HttpOnly cookies.
Rate Limiting
Login attempts (5/5 min), 2FA verification (10/5 min), and agent API endpoints are all rate-limited by IP to prevent brute force attacks.
Role-Based Access
Admins get full system access. Users are limited to assigned clients with granular permissions for backup, restore, repo management, and maintenance.
Two-Factor Authentication
TOTP-based 2FA compatible with any authenticator app. Admins can enforce 2FA for all users. Recovery codes are bcrypt-hashed and single-use.
Encryption at
every layer
Sensitive data is protected both in the database and in backup archives, using industry-standard encryption algorithms.
- Database credentials encrypted with AES-256-GCM + server APP_KEY
- Borg archives encrypted with repokey-blake2 (AES-256) by default
- Passwords hashed with bcrypt — never stored in plaintext
- 2FA recovery codes are also bcrypt-hashed and single-use
Stay current with
security patches
Keep agents, Borg binaries, and the server itself up to date without touching a terminal. Updates are deployed from the web interface with automatic validation.
- Agent updates deployed individually or in bulk from the web UI
- Borg binary versions managed centrally with per-agent control
- Server checks for new releases daily with web UI or CLI upgrade
- Automatic rollback on failed agent updates
Security at every layer
A complete overview of how Borg Backup Server protects your infrastructure.
Report a vulnerability
If you discover a security vulnerability in Borg Backup Server, please do not open a public issue. Report it privately instead.
[BBS Security] <brief description>
- Authentication & session management
- SQL injection, XSS, CSRF (OWASP Top 10)
- Agent API authentication bypass
- Credential exposure
- Privilege escalation
- Remote code execution
- Third-party dependency bugs
- Denial of service attacks
- Physical access scenarios
- Social engineering
We follow coordinated disclosure. Once a fix is released, the vulnerability will be documented in the release notes. Credit will be given unless you prefer to remain anonymous.
See it in action
Spin up a live demo to explore the security features yourself. Full access, no credit card, no install.