Do you think it’s worth keeping 2FA OTPs in a separate source from your password manager? Currently I keep them in Bitwarden. I was thinking keeping them separate could add a little extra security in case my BW was cracked, but not sure it’s worth the hassle of loading a second app for logins.

Do you know of an app that does 2FAs as conveniently as Bitwarden, in that it has mobile apps, browser extension, etc that can all access the same vault?

here’s one i came across from an awesome-selfhosted list. i would need to test the PWA experience https://github.com/Bubka/2FAuth

  • Extras
    link
    fedilink
    94 months ago

    Its really a preference thing for convenience. You’ll still have both your password manager and 2fa on the same device either way. Aegis on another device or user profile is my preferred way if security is a must

  • asudox
    link
    5
    edit-2
    4 months ago

    Yes. If you use bitwarden, even if you pay for premium or host it yourself, don’t keep them in the vault. Don’t sync them over the internet. In case someone somehow gets into your password manager, at least the TOTP secured accounts will (most likely) stay safe. The recovery codes should stay offline and encrypted somewhere safe in your home. You probably also want to secure your BW account with a hardware key such as yubikey for additional security.

    • @just_another_person
      link
      -74 months ago

      Not trying to be nitpicky, but 2FA only works over internet. Separating these two things has nothing to do with connectivity. Splitting them just give you security through obscurity in most cases because if something like bitwarden were to be compromised, there is almost certainly an overlap that could somehow get you access to other services protected by 2FA.

      • @[email protected]
        link
        fedilink
        8
        edit-2
        4 months ago

        I’m pretty sure 2FA can work offline as well. You definitely don’t need an internet connection to perform 2FA with OTP codes.

        • @just_another_person
          link
          -124 months ago

          No. 2FA as a functional protocol requires internet. No way around that considering the secured source needs to send updates to the app you referenced down to subsecond.

          Maybe you’re thinking of TOTP which does have a very small window where offline keys could work?

          • asudox
            link
            54 months ago

            I obviously am speaking of TOTP. OP uses Bitwarden, which can only store TOTPs. And TOTPs do work offline as they only need the device’s internal clock to work. As long as that is synced, TOTP will work.

              • asudox
                link
                5
                edit-2
                4 months ago

                Indeed. Since it seems like that was too ambigious for you, I explicitly changed it to TOTP.

                I mean, if you knew how most of the password managers worked, you also would’ve known this.

                Edit: Furthermore, the 2FAs you speak of are proprietary solutions that can’t even be added to password managers, so I assume you didn’t even properly read anything.

    • Fox Trenton
      link
      fedilink
      24 months ago

      Same here. Plus I don’t store the KeePass files in the cloud, as service or otherwise.

  • @EntropyPure
    link
    44 months ago

    At the end of the day it is a matter of preference and convenience. Is it safer to separate them? Absolutely. Is it as convenient as keeping them in one place? Absolutely not.

    So, pick your poison. Personally I have my MFA tokens in three separate locations, two self hosted server applications and in a mobile app (2FAS Auth). More for fallback/backup reasons. Having them in my password manager is just too convenient.

  • slazer2au
    link
    English
    44 months ago

    KeypassXC has otp support and they recommend storing those codes in a second database seperate from the passwords themselves.

      • slazer2au
        link
        English
        44 months ago

        If your password file gets lost/compromised/stolen your accouts are still safe with the MFA codes being stored elsewhere.

        • @[email protected]
          link
          fedilink
          24 months ago

          Ok, but how does the password file get compromised but the 2FA file not? Why not have a separate password file for every login with a different password then?

          • slazer2au
            link
            English
            14 months ago

            non ECC ram does funny things under high load.

  • @GustavoFring
    link
    34 months ago

    Proton Pass and Ente Auth are both convenient and secure imo.

    • @slugOP
      link
      14 months ago

      Ente looks really nice but I wish it had a Firefox addon

      • @AbidanYre
        link
        English
        14 months ago

        I think auth is a pretty recent addition to ente’s lineup.

        I self host photos and their customer service has still been pretty responsive, so it may be worth reaching out and asking if a browser extension is on the roadmap.

      • UnfortunateShort
        link
        1
        edit-2
        4 months ago

        They do have desktop apps at least. I’m happy with it so far, totally second the recommendation.

        Regarding your general question: I would argue that a separate 2FA app is a must, since you can not only secure your password manager with it, but also remain protected if it is breached somehow.

        Having 2FA and credentials in one place partly breaks the rational between having 2FA at all.

        • @slugOP
          link
          14 months ago

          i just realized i set up ente but put the login for it in my bitwarden. that kind of defeats the purpose. so i guess i would need to save the ente creds outside of bitwarden… then i need a second 2FA source for that… endless cycle…

          • @GustavoFring
            link
            14 months ago

            Well yes and no. You would still need access to your email as well for the login approval on ente auth.

          • UnfortunateShort
            link
            14 months ago

            I don’t bother with 2FA for Ente. It’s supposed to add a layer of security, no need to add yet another layer just for the sake of it.

  • @[email protected]
    link
    fedilink
    2
    edit-2
    4 months ago

    For me it depends how “hardened” the account needs to be.

    For key accounts I keep the 2fa seperated (where possible with a fido token) For not so relevant accounts I add it to bitwarden. Because I probably wouldnt activate 2fa for these accounts if I’d have to pull out the phone each time

    Edit: you also can add the 2fa token to a separate vault