this post was submitted on 26 Jul 2024
38 points (100.0% liked)

Privacy

31814 readers
247 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Do you think it's worth keeping 2FA OTPs in a separate source from your password manager? Currently I keep them in Bitwarden. I was thinking keeping them separate could add a little extra security in case my BW was cracked, but not sure it's worth the hassle of loading a second app for logins.

Do you know of an app that does 2FAs as conveniently as Bitwarden, in that it has mobile apps, browser extension, etc that can all access the same vault?

here's one i came across from an awesome-selfhosted list. i would need to test the PWA experience https://github.com/Bubka/2FAuth

all 29 comments
sorted by: hot top controversial new old
[–] RandomLegend@lemmy.dbzer0.com 22 points 3 months ago

i keep my passwords and my OTPs strictly separated.

Don't keep all your eggs in one basked

[–] Extrasvhx9he@lemmy.today 10 points 3 months ago (1 children)

Its really a preference thing for convenience. You'll still have both your password manager and 2fa on the same device either way. Aegis on another device or user profile is my preferred way if security is a must

[–] shreddy_scientist@lemmy.ml 6 points 3 months ago

Aegis is the move, my favourite option for sure!

[–] Asudox@lemmy.world 6 points 3 months ago* (last edited 3 months ago) (1 children)

Yes. If you use bitwarden, even if you pay for premium or host it yourself, don't keep them in the vault. Don't sync them over the internet. In case someone somehow gets into your password manager, at least the TOTP secured accounts will (most likely) stay safe. The recovery codes should stay offline and encrypted somewhere safe in your home. You probably also want to secure your BW account with a hardware key such as yubikey for additional security.

[–] chip@feddit.rocks 5 points 3 months ago (1 children)

I have two separate keepass containers, one for passwords and another for TOTP.

[–] sintrenton@lemmy.ml 2 points 3 months ago

Same here. Plus I don't store the KeePass files in the cloud, as service or otherwise.

[–] GustavoFring@lemmy.world 4 points 3 months ago (2 children)

Proton Pass and Ente Auth are both convenient and secure imo.

[–] slug@lemmy.world 2 points 3 months ago (2 children)

Ente looks really nice but I wish it had a Firefox addon

[–] UnfortunateShort@lemmy.world 2 points 3 months ago* (last edited 3 months ago) (1 children)

They do have desktop apps at least. I'm happy with it so far, totally second the recommendation.

Regarding your general question: I would argue that a separate 2FA app is a must, since you can not only secure your password manager with it, but also remain protected if it is breached somehow.

Having 2FA and credentials in one place partly breaks the rational between having 2FA at all.

[–] slug@lemmy.world 1 points 3 months ago (2 children)

i just realized i set up ente but put the login for it in my bitwarden. that kind of defeats the purpose. so i guess i would need to save the ente creds outside of bitwarden... then i need a second 2FA source for that... endless cycle...

[–] GustavoFring@lemmy.world 1 points 3 months ago

Well yes and no. You would still need access to your email as well for the login approval on ente auth.

[–] UnfortunateShort@lemmy.world 1 points 3 months ago

I don't bother with 2FA for Ente. It's supposed to add a layer of security, no need to add yet another layer just for the sake of it.

[–] AbidanYre@lemmy.world 1 points 3 months ago

I think auth is a pretty recent addition to ente's lineup.

I self host photos and their customer service has still been pretty responsive, so it may be worth reaching out and asking if a browser extension is on the roadmap.

[–] slazer2au@lemmy.world 4 points 3 months ago (1 children)

KeypassXC has otp support and they recommend storing those codes in a second database seperate from the passwords themselves.

[–] dessalines@lemmy.ml 1 points 3 months ago (1 children)
[–] slazer2au@lemmy.world 4 points 3 months ago (1 children)

If your password file gets lost/compromised/stolen your accouts are still safe with the MFA codes being stored elsewhere.

[–] Mike1576218@lemmy.ml 2 points 3 months ago (1 children)

Ok, but how does the password file get compromised but the 2FA file not? Why not have a separate password file for every login with a different password then?

[–] slazer2au@lemmy.world 1 points 3 months ago

non ECC ram does funny things under high load.

[–] EntropyPure@lemmy.world 4 points 3 months ago

At the end of the day it is a matter of preference and convenience. Is it safer to separate them? Absolutely. Is it as convenient as keeping them in one place? Absolutely not.

So, pick your poison. Personally I have my MFA tokens in three separate locations, two self hosted server applications and in a mobile app (2FAS Auth). More for fallback/backup reasons. Having them in my password manager is just too convenient.

[–] xnx@slrpnk.net 4 points 3 months ago

I use proton pass and 2fas it has extensions and apps https://2fas.com/browser-extension/

[–] Freuks@lemmy.ml 3 points 3 months ago

OTP in password manager is just useless no ? As Everything is in it.

I personally have Bitwarden for pass and Aegis for OTP. Switching to Bitwarden Authenticator tho

[–] tuhriel@infosec.pub 2 points 3 months ago* (last edited 3 months ago)

For me it depends how "hardened" the account needs to be.

For key accounts I keep the 2fa seperated (where possible with a fido token) For not so relevant accounts I add it to bitwarden. Because I probably wouldnt activate 2fa for these accounts if I'd have to pull out the phone each time

Edit: you also can add the 2fa token to a separate vault