TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Why does storing 2FA codes in your password manager make sense?

107 点作者 andygrunwald5 个月前

36 条评论

nlawalker5 个月前
You are better off security-wise with 2FA enabled than without it (for the phishing-related reasons mentioned in TFA - EDIT: taviso is correct in their comment, it&#x27;s more about protection against credential stuffing than phishing), regardless of where you put the codes, so if being able to put the codes in your password manager is going to be the difference-maker in someone electing to use 2FA, they should do it.<p>It&#x27;s the same idea with using a password manager in the first place - if a password manager is going to be the thing that gets you to use secure passwords that vary across services, it&#x27;s worth the tradeoff of having all of those passwords in one place, because you&#x27;re much more likely to be compromised by a bad password than by a password manager leak.
评论 #42567815 未加载
评论 #42567827 未加载
评论 #42567866 未加载
评论 #42567930 未加载
mid-kid5 个月前
The reason I store 2FA codes in my password manager is as a protest to companies forcing me to have a 2FA. I don&#x27;t want to be randomly locked out of my google account due to not having a usable 2FA, and I also don&#x27;t want to depend on having a single device be always available to provide the codes.<p>In practice, I feel the main reason 2FA is popular is because people cannot be trusted to create unique and secure passwords for every service. The phishing-resistance is nice, but I&#x27;d prefer it being the only credential, and just having it be autofilled (making it longer to combat bruteforce), like what we currently have with password managers...<p>Here&#x27;s to hoping passkeys turn out any better.
评论 #42568500 未加载
评论 #42568218 未加载
评论 #42568040 未加载
评论 #42568541 未加载
Alex-Programs5 个月前
I store 2FA keys in a fingerprint protected Aegis vault on my phone, and I periodically export an encrypted (with a master password I remember) backup that I then email to my parents.<p>I get their argument that 2FA makes phishing more difficult, but I disagree that it&#x27;s its &quot;primary use&quot;, or that the distributed factor is unimportant. I personally wouldn&#x27;t feel comfortable having all my important accounts behind Bitwarden&#x27;s single point of failure. 2FA for important accounts mitigates the damage if my Bitwarden is broken into.
taviso5 个月前
I&#x27;m not familiar with the expert they consulted, but the claim that &quot;The main advantage of 2FA is that it is much more difficult to gain access to your accounts via phishing attacks&quot; is just plain false.<p>TOTP or SMS-2FA are obviously phishable, if you just entered your password into a phishing site, why wouldn&#x27;t you also enter a TOTP code? I usually point to Modlishka as a practical example (<a href="https:&#x2F;&#x2F;vimeo.com&#x2F;308709275" rel="nofollow">https:&#x2F;&#x2F;vimeo.com&#x2F;308709275</a>) to help visualize this.<p>In fact, the main (claimed) advantage of 2FA is that it prevents &quot;Credential Stuffing&quot; of reused passwords. I personally don&#x27;t think TOTP (or similar) are a good solution to this problem at all, but this is a thorny issue.
评论 #42567729 未加载
评论 #42567752 未加载
gchamonlive5 个月前
It&#x27;s better than not having 2fa, but a breach to your password manager would give any attacker full control over your accounts.<p>A better approach would be to split in two solutions where you store passwords and 2fa keys.<p>I use bitwarden for passwords, but save all 2fa in aegis. These two have different 5 word passphrases prefixed with a regular 8 char password to increase entropy. I save a backup of the 2fa db to a replicated storage with a synthetic password. For bitwarden I delegate persistence of the data to bitwarden, but it would make sense to take encrypted backups regularly.<p>The disaster recover protocol is to have a smaller 2fa encrypted database printed in paper. I know the password to this db. Recovering this DB gives me access to bitwarden and the cloud storage, which gives me access to the rest of my password and keys.
评论 #42573014 未加载
1970-01-015 个月前
I disagree with the experts here. There was and is absolutely nothing wrong, and quite a lot right, by having the 2FA program completely separate from your password vault. At best, this is a lateral security trade-off that you are paying them to provide. View the 2FA feature from a software marketing and sales lens. Can you see how it&#x27;s just feature creep, driven by competition doing the exact same thing?
评论 #42567855 未加载
评论 #42567756 未加载
评论 #42567890 未加载
skybrian5 个月前
More generally: the world would be a better place if most people relied on password managers. If you can do it reliably, using any password manager, even the one built into your browser or OS, is better than not using one.<p>The problem is that it requires a certain amount of good hygiene when it comes to computer equipment. There are many people who are bad with computers, who don’t have phone backups and lose their phone, who will share accounts and devices, and so on. The result is an insecure mess.<p>So, solving the “people should use a password manager” problem requires solving all the other issues surrounding how non-technical people use and misuse computer equipment, so that having a password manager and not losing the essential data stored in it becomes the default.<p>For some people, it would probably be safer and easier to write down your passwords on paper, in a notebook. Other people will lose the notebook, or have it stolen from them. There are similar but more complicated issues with holding onto computer devices.
评论 #42568048 未加载
myflash135 个月前
Important to note that not all password managers are equal. Using Apple’s built-in password manager is more secure because it is inherently tied to your biometrics and authentication is hardware-based, i.e Secure Enclave. This is categorically different from web services like Bitwarden or 1Password authenticated by login email and 2FA codes. Even if someone got into your Apple ID they still would be unable to view or sync your passwords without biometrics.
评论 #42570099 未加载
评论 #42567760 未加载
评论 #42567742 未加载
throwpoaster5 个月前
I had my password manager compromised by a business partner. I added him to my 1Password account and then, in a play for control of the company, he attempted to remove me. Lesson learned: don&#x27;t try to save money on password managers.<p>If all of my 2FA code generators had been in 1Password I would have been truly screwed, but in a stroke of luck I had been paranoid enough to use a separate app for 2FA codes.
评论 #42567735 未加载
评论 #42567814 未加载
评论 #42567682 未加载
评论 #42568169 未加载
bloopernova5 个月前
Because there&#x27;s a trade-off between security and convenience.
评论 #42567513 未加载
kif5 个月前
People advocating against storing 2FA codes in the password manager are correct from a purist perspective, but not from a pragmatic perspective if you ask me.<p>If my device is compromised, along with my device&#x27;s password, as well as the password manager&#x27;s password, then yeah... I&#x27;m screwed.<p>As long as I keep my devices up-to-date though, I believe the highest risk comes from state-sponsored actors. I&#x27;ve chosen convenience, and I&#x27;ve made my peace with it.
cycomanic5 个月前
It&#x27;s interesting how many argue that putting 2FA codes into a password manager is wrong because you combine 2 factors into one (not don&#x27;t fully agree with that reasoning), but then are happy with passkeys. How are passkeys better?
评论 #42568562 未加载
评论 #42568278 未加载
cheald5 个月前
I think it&#x27;s a terrible idea, because it dramatically decreases the attack surface area needed to compromise accounts. 2FA is <i>supposed</i> to be &quot;something you know&#x27; and &quot;something you have&quot;; putting your 2FA seeds into your password manager reduces your 2FA to &quot;something you know&quot;, <i>and</i>, significantly worse, it&#x27;s &quot;something you know in the same place as the other thing you know&quot;.<p>The time-variant component is still quite valuable, but it does nothing to protect you in the event of a password manager compromise. This is not a hypothetical; LastPass has suffered multiple breaches, and the more popular a solution, the more likely there are to be attacks against that solution. By keeping your 2FA separate from your password manager, even if it&#x27;s still just &quot;something you know&quot;, it&#x27;s something you know in a location that&#x27;s orthogonal to your passwords. If I yield to convenience and use a 2FA desktop app, then now, instead of just attacking my Bitwarden install, you have to successfully attack my Bitwarden install <i>and</i> my 2FA desktop app install to get access to my accounts, and the combination of password managers * 2FA managers is a substantially larger attack surface and requires a significantly more sophisticated attack to get both pieces.<p>The arguments in the article come down to &quot;well, 2FA mitigates phishing attacks&quot; (true) and &quot;Google Authenticator means you can lose your data easily&quot; (also true). But neither of these is a good argument for why the data should be kept together. It just means &quot;use 2FA&quot;, and &quot;use a 2FA manager that lets you directly manage your seeds and keep offsite encrypted backups&quot;.<p>If you can&#x27;t be bothered to do it properly, then 2FA codes in your password manager is certainly better than not using 2FA at all, but that just makes it a less terrible solution, not a good one.
评论 #42567711 未加载
评论 #42567706 未加载
评论 #42568023 未加载
评论 #42567649 未加载
评论 #42567609 未加载
评论 #42568301 未加载
评论 #42567651 未加载
评论 #42567626 未加载
WhyNotHugo5 个月前
The first reasoning basically summarises to &quot;storing 2FA token in a password manager protects against phishing because the TOTP token won&#x27;t be autocompleted on the wrong domain&quot;.<p>Any decent password manager would avoid autocompleting the password on the wrong domain in the first place. I.e.: it will already protect against phishing attacks anyway.<p>1Password&#x27;s documentation use to have a whole article about how bad an idea it was to store TOTP in a password manager — but their stance completely changed at some point. Around the same time they started _recommending_ that you do so, and presented it as a key feature in the marketing material.<p>---<p>Personally, I think that the only valid reason to store a TOTP secret in password manger is when you don&#x27;t really care too much about an account (e.g.: prefer convenience over security), but the website demands that I set up 2FA.
kazinator5 个月前
The author of this article is unaware of the possibility of an audience who has no idea what the use case looks like for a short temporary token to be stored in a semi-permanent store like a password manager; what does it do? How does the token get there, and how is it used? Does the password manager infrastructure have access to the stream of tokens so that it populates the latest one, and fills it in for you when you&#x27;re authenticating? Obviously any manual step in handling the token via the password manager will be worse (or no better) than just entering the token manually into the authentication dialog, so it has to work that way?
timwis5 个月前
Related: Why is it a good idea to store 2FA tokens in 1Password?<p><a href="https:&#x2F;&#x2F;1password.community&#x2F;discussion&#x2F;comment&#x2F;496555" rel="nofollow">https:&#x2F;&#x2F;1password.community&#x2F;discussion&#x2F;comment&#x2F;496555</a>
conception5 个月前
Using 1Password requires me to use one of my devices to add a device to my account.<p>If someone has my password and my device how will a separate app help me in this case?<p>Honest question as the 1password model seems to be “something you know and something you have”.
评论 #42567889 未加载
ww5205 个月前
One of the risks of 2FA is losing access to your accounts after losing the authenticating device. Backing up the 2FA seeds mitigates that risk. The backup needs to be encrypted with the password remembered and stored somewhere. Sounds like it’s a job for a password manager, preferably in an offline local password manager with a different database.
评论 #42568274 未加载
hackerbrother5 个月前
Ultimately, you have to store your backup codes somewhere. So the only solution besides using your password manager is using a second password manager. Or not using a password manager to save off your backup codes, which has its own disadvantages.<p>There&#x27;s lots of cases where 2FA reduces to 1FA. E.g. logging into a website on your mobile phone, and getting your TOTP or SMS code on that same phone. In fact-- that case is so common I wonder if we should just get more used to the idea of 1FA, with smartphone passkeys&#x2F;biometrics&#x2F;SSO being the auth factor. As it stands, if you compromise someone&#x27;s smartphone (and have their smartphone PIN), the odds are great you can autofill any password you like on their phone and pull up any needed 2FA tokens as well.
aftbit5 个月前
IMO the real advantages of 2FA are threefold:<p>1. The key is generated by the server, not the client (human), so it cannot be reused like a password.<p>2. The authentication is temporally bound, so phishing only offers access for ~30 seconds, unlike a password where it provides unlimited access until someone changes it (never unless forced in practice).<p>3. It&#x27;s literally required for many services, so you need to use it. The alternatives to storing your secrets in your password manager are keeping them on your phone (which is how most people log in anyway, so its already becoming a single point of failure) or using something like SMS 2FA, which is even worse as SIM jacking is pretty trivially possible on most providers.
superultra5 个月前
The primary reason I used 1password + 2FA at both my business and in my family is really simple: 1password creates a shared 2FA process. That is, I can create a 2FA login that someone else in my team or family can also access.
11235813215 个月前
Good advice in this article. Keeping TOTP in a good password manager removes risk of making mistakes with the codes by tying it to the same auth sequence as the password. The assurance that the codes are securely stored, easy to use and to establish on a new trusted device lets services be used confidently which don’t allow vulnerable bypassing of credentials with easily purchased proofs (SSNs, street address etc.)<p>Backing up TOTP seeds encrypted is a good idea if you know what you’re doing.<p>It is a security-improving move when humans are factored in, not a trade-off between security and convenience.
xlii5 个月前
This might not be solution for everyone but wouldn’t the best protection to use two separate password managers? One for passwords and the other for the TOTPs?<p>I wonder why service providers don&#x27;t have it already. They could even help ensuring that the passwords are different and provide some interoperability between both vaults (e.g. TOTP on mobile device is passed to PC password completions)
jopsen5 个月前
I really wish we could store passkeys and totp in bitwarden where access always goes through a server side KMS.<p>Currently, bitwarden stores these encrypted, but they are unlocked with the rest of the password manager.<p>For now I&#x27;ll stick to yubikey for 2FA.<p>But I wish I could use bitwarden as a layer of abstraction, such that bitwarden would always require my yubikey before allowing any of the passkeys or totp keys to be used.
alistairSH5 个月前
Maybe there’s a language issue here… but would any saved 2FA code be expired the next time you retrieved it from your password manager? They’re generated for one-time use and have an expiration, right?<p>Or, when the author says “save the 2FA code” does he really mean “use the password manager to generate the 2FA codes”?
Eric_WVGG5 个月前
A good explanation for the layperson is: MFA means access requires something you <i>know</i> (a password) and something you <i>have</i>.<p>In the early days of MFA that thing meant a cellphone because it was SMS by default, but yeah, a laptop or computer of any kind is a &quot;thing you have&quot; as well.
kardianos5 个月前
If useful to this crowd. I use keepassx, I made a way to easily print off key passwords along with their instructions:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;kardianos&#x2F;safekeysheet">https:&#x2F;&#x2F;github.com&#x2F;kardianos&#x2F;safekeysheet</a><p>It could be modified to also print out the otp as well if stored.
complex_pi5 个月前
A file-based password manager ils something you have (the file) and something you know (the master password) provided you have a timeout on the password manager and a safe screensaver. (In reply to some comments below).<p>It does require some thought &#x2F; hygiene but seems a fair compromise.
evanjrowley5 个月前
For a few years I&#x27;ve used the exact same setup as the author in regards to my TOTP codes, password manager, and WebAuthn hardware keys. This past year, I&#x27;ve supplemented this with biometric passkeys on Windows, Apple, and Android.
loeg5 个月前
Basically because 2FA is a useless nuisance when you&#x27;ve got unique high entropy passwords that can&#x27;t be stuffed, and it&#x27;s not a defense against your entire password corpus being leaked.
lazyeye5 个月前
When I upgrade my phone, I keep the old one as a backup and load the same OTP codes into the authenticator app on my new phone. It is no problem to have OTP codes on multiple phones.
LorenzoGood5 个月前
I do it for some accounts where I don&#x27;t care that much about having 2fa, but its forced, and its easier than getting SMS notifications.
notorandit5 个月前
You may say I am a dreamer, but I am not the only one!<p>Storing 2FA codes in your password manager is not a good idea at all in case you get it breached. Otherwise it could be a convenient idea.<p>If your password manager gets breached you could also loose control of your 2FA as it can be replaced as well.<p>We need to securely store our 2FA codes, sure. But I would advise not to use the &quot;normal&quot; password manager. I for use have them printed on paper.
gruez5 个月前
&gt;A time-based 2FA (TOTP) is time-sensitive, and a man-in-the-middle or proxy needs to be set up to capture that in real-time<p>Is that supposed to be remotely difficult? It&#x27;ll take maybe an hour to whip up a script that takes the captured credentials, passes it onto a headless browser to attempt the login, capture the session cookie, and optionally refresh the page regularly to keep the session active.
评论 #42567728 未加载
yapyap5 个月前
cause the risk isnt in hackers hacking your password manager
ezfe5 个月前
TLDR: Account security is a balance and saving it in a password manager has more benefits than downsides