Do you think it’s worth keeping 2FA OTPs in a separate source from your password manager? Currently I keep them in Bitwarden. I was thinking keeping them separate could add a little extra security in case my BW was cracked, but not sure it’s worth the hassle of loading a second app for logins.

Do you know of an app that does 2FAs as conveniently as Bitwarden, in that it has mobile apps, browser extension, etc that can all access the same vault?

here’s one i came across from an awesome-selfhosted list. i would need to test the PWA experience https://github.com/Bubka/2FAuth

  • Extras@lemmy.today
    link
    fedilink
    arrow-up
    10
    ·
    5 months ago

    Its really a preference thing for convenience. You’ll still have both your password manager and 2fa on the same device either way. Aegis on another device or user profile is my preferred way if security is a must

  • asudox@lemmy.world
    link
    fedilink
    arrow-up
    7
    arrow-down
    1
    ·
    edit-2
    5 months ago

    Yes. If you use bitwarden, even if you pay for premium or host it yourself, don’t keep them in the vault. Don’t sync them over the internet. In case someone somehow gets into your password manager, at least the TOTP secured accounts will (most likely) stay safe. The recovery codes should stay offline and encrypted somewhere safe in your home. You probably also want to secure your BW account with a hardware key such as yubikey for additional security.

    • just_another_person@lemmy.world
      link
      fedilink
      arrow-up
      2
      arrow-down
      8
      ·
      5 months ago

      Not trying to be nitpicky, but 2FA only works over internet. Separating these two things has nothing to do with connectivity. Splitting them just give you security through obscurity in most cases because if something like bitwarden were to be compromised, there is almost certainly an overlap that could somehow get you access to other services protected by 2FA.

      • LinkA
        link
        fedilink
        arrow-up
        9
        arrow-down
        1
        ·
        edit-2
        5 months ago

        I’m pretty sure 2FA can work offline as well. You definitely don’t need an internet connection to perform 2FA with OTP codes.

        • just_another_person@lemmy.world
          link
          fedilink
          arrow-up
          1
          arrow-down
          13
          ·
          5 months ago

          No. 2FA as a functional protocol requires internet. No way around that considering the secured source needs to send updates to the app you referenced down to subsecond.

          Maybe you’re thinking of TOTP which does have a very small window where offline keys could work?

          • asudox@lemmy.world
            link
            fedilink
            arrow-up
            5
            ·
            5 months ago

            I obviously am speaking of TOTP. OP uses Bitwarden, which can only store TOTPs. And TOTPs do work offline as they only need the device’s internal clock to work. As long as that is synced, TOTP will work.

              • asudox@lemmy.world
                link
                fedilink
                arrow-up
                6
                arrow-down
                1
                ·
                edit-2
                5 months ago

                Indeed. Since it seems like that was too ambigious for you, I explicitly changed it to TOTP.

                I mean, if you knew how most of the password managers worked, you also would’ve known this.

                Edit: Furthermore, the 2FAs you speak of are proprietary solutions that can’t even be added to password managers, so I assume you didn’t even properly read anything.

  • EntropyPure@lemmy.world
    link
    fedilink
    arrow-up
    4
    ·
    5 months ago

    At the end of the day it is a matter of preference and convenience. Is it safer to separate them? Absolutely. Is it as convenient as keeping them in one place? Absolutely not.

    So, pick your poison. Personally I have my MFA tokens in three separate locations, two self hosted server applications and in a mobile app (2FAS Auth). More for fallback/backup reasons. Having them in my password manager is just too convenient.

      • UnfortunateShort@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        5 months ago

        They do have desktop apps at least. I’m happy with it so far, totally second the recommendation.

        Regarding your general question: I would argue that a separate 2FA app is a must, since you can not only secure your password manager with it, but also remain protected if it is breached somehow.

        Having 2FA and credentials in one place partly breaks the rational between having 2FA at all.

        • slug@lemmy.worldOP
          link
          fedilink
          arrow-up
          1
          ·
          5 months ago

          i just realized i set up ente but put the login for it in my bitwarden. that kind of defeats the purpose. so i guess i would need to save the ente creds outside of bitwarden… then i need a second 2FA source for that… endless cycle…

          • UnfortunateShort@lemmy.world
            link
            fedilink
            arrow-up
            1
            ·
            5 months ago

            I don’t bother with 2FA for Ente. It’s supposed to add a layer of security, no need to add yet another layer just for the sake of it.

      • AbidanYre@lemmy.world
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 months ago

        I think auth is a pretty recent addition to ente’s lineup.

        I self host photos and their customer service has still been pretty responsive, so it may be worth reaching out and asking if a browser extension is on the roadmap.

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    5 months ago

    KeypassXC has otp support and they recommend storing those codes in a second database seperate from the passwords themselves.

  • tuhriel@infosec.pub
    link
    fedilink
    arrow-up
    2
    ·
    edit-2
    5 months ago

    For me it depends how “hardened” the account needs to be.

    For key accounts I keep the 2fa seperated (where possible with a fido token) For not so relevant accounts I add it to bitwarden. Because I probably wouldnt activate 2fa for these accounts if I’d have to pull out the phone each time

    Edit: you also can add the 2fa token to a separate vault