I have read quite a few posts about preventing account password takeover from various malicious ways, and many OPSEC measures are there to prevent it from happening.

Consider a case where you face a total blackout or technical failure. Now, you need to log in to your password manager, which requires either OTP on email or TOTP. You don’t have access to the TOTP app because the backup is stored in cloud storage, whose email login also requires OTP.

How would you prevent such from happening?I haven’t found a satisfactory solution or explanation for that yet.

  • kevincox@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    I created a USB with an encrypted copy of my root password to a few people. It also has backups of encrypted passwords databases and some other useful files.

  • EngineerGaming@feddit.nl
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    Log in to your password manager? KeepassXC just needs a decryption password. AFAIK you can set up additional protection but none of that include email.

    • Extras@lemmy.today
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      Just to add on what you want is the 3,2,1 method of backing up. You’re asking for trouble if you just rely on cloud storage for anything that important.

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    I sync my KeePass database to Dropbox.

    I have access to Dropbox on my phone and my desktop. Of I change either I can copy the file to the new device and setup the sync again.

  • grue@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    5 months ago

    That’s what generating some backup OTPs (e.g. like this, minus the Google part since this is !privacy) and printing them out on physical paper is for.

  • JoeKrogan@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    I export my totp from freeotp+. I have it added to keepassxc and sync that with syncthing to multiple devices.

    If I lose the phone I can just import the exports to a fresh app on another phone.

    Another option is use waydroid and backup the VM

  • solrize@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    Now, you need to log in to your password manager, which requires either OTP on email or TOTP. You don’t have access to the TOTP app because the backup is stored in cloud storage, whose email login also requires OTP.

    The mind wobbles. Don’t do what you are describing.

  • baritone_edge@lemmy.ml
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    I almost did this to myself. I actually set it up this way, but realized my mistake before logging out of anything so I just disabled it and set it up differently.

    I have multiple old phones that I’ve taken apart and removed the antennas, cameras, and mics from so they can’t connect to anything even if you wanted to. I store extra copies of my 2FA there, I committed to memory the password to my hard drive and password vaults, setup recovery codes, and printed out the information that was too important to lose. Saved the information in a file and encrypted it to two USB drives with passwords I know I know. And created copies of the password vault in several offline locations. Much better setup with idiot proof redundancy.

  • vrighter@discuss.tchncs.de
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    keep a copy of the db on your phone. I set up syncthing so the “cloud” I back up to is just my phone. You can obviously use other methods too for redundancy. I also use keepass, so my database is in my control.

  • RovingFox@infosec.pub
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    5 months ago

    Personally I use BitWarden with a unique pain in the ass password that I have written it down somewhere.

    From there I can get back into everything.

  • m-p{3}@lemmy.ca
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    5 months ago

    One trick is that you can enroll your TOTP codes on more than one device, the only thing the device need is the clock to be synced to provide the correct code.

    You can store your TOTP codes in many places:

    • A mobile app like Aegis (Android) or 2FAS (Android, iOS). Those even offer a way of backing up your TOTP codes, but you need to take the proper measure to store them safely.
    • A password manager that can handle TOTP like Bitwarden (with a premium subcription) or KeePassXC.
    • A security key like the Yubikey 5 can safely store TOTP keys (up to 32) and generate them through the Yubikey Authenticator app.

    That way you don’t get caught your pants down if one of your device dies, get stolen, etc. Also, keep the recovery keys / backup keys in a safe place just in case of a worst case scenario.

    Keep in mind that your TOTP backup and Password Manager files like KeePassXC can be the weakest link in your OPsec if you’re not careful.

    • veroxii@aussie.zone
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      I thought KeePass files are strongly encrypted. How are they the weakest link if you use a proper pass phrase?

      • m-p{3}@lemmy.ca
        link
        fedilink
        arrow-up
        0
        ·
        edit-2
        5 months ago

        A strong and unique passphrase is indeed really important here, but you need to keep in mind that once the kdbx file is in the attacker’s hand, that’s the only thing that keep them out.

        There’s no 2FA, and no throttling on the bruteforce process. So it’s really important to use a strong password there to avoid it being the weakest link.

        • catloaf@lemm.ee
          link
          fedilink
          English
          arrow-up
          0
          ·
          5 months ago

          You can kind of do MFA on the database. You can require a key, which can be very long and complex, and you can store it on a USB drive. You might be able to use a key stored on a yubikey or something too, I haven’t tried it. It probably depends on which KeePass variant you’re using.

          • sntx@lemm.ee
            link
            fedilink
            arrow-up
            0
            ·
            5 months ago

            I use KeePass with three factors:

            • The password
            • A keyfile I distribute out of band between all hosts that should be able to open the database
            • A set of Hardware Keys supporting challange-response

            Works really well IMO. I use KeePassXC on Linux and KeePass2Android on Android.

  • RageAgainstTheRich@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    5 months ago

    Oh this is a good post for me! This happened to me. I had my pc drive encrypted so when it boots, i need to provide it with the password before it boots my OS. I use bitwarden to store my passwords and my bitwarden needs my 2FA code to unlock.

    I wanted to install the newest version of LineageOS on my phone so i backed up everything to my pc and made sure i had everything backed up properly.

    Then i wiped my phone and downloaded the new LineageOS iso and had to put it on my phone using ADB. But it had an issue to where it wouldn’t detect the phone. So i thought “Let me reboot my PC real quick because that might fix it.”

    Presses reboot… "Please type your password to decrypt your harddrive: "

    Fuck…

    I have never had a worse panic attack in my life. EVERYTHING was on that drive. My work, my photos, my bank info, my entire life was on that encrypted drive.

    But my password was on bitwarden. And to unlock bitwarden i needed my 2FA. Which i had backed up on my drive… which was now encrypted and i couldn’t unlock anymore.

    I absolutely fucking lost it.

    I dug through the entire house and after almost 8 hours of searching i found one of my old laptops in a box in the attic. I suddenly i got the idea that MAYBE i had once backed up my phone stuff before because i ran the phone OS it came with and i then at one point installed LIineageOS.

    I dug through every single folder and suddenly i found an old vault backup of the two-factor authenticator UNENCRYPTED app that i had used before.

    I send it to my wife’s phone and imported it into the app. The ONLY account that was on there… was bitwarden.

    After almost 14 hours of pure stress and panic, i was able to decrypt my harddrive.

    So my PERSONAL advice is ALWAYS store a physical backup.

    I don’t want to go through that stress ever again.

    • EngineerGaming@feddit.nl
      link
      fedilink
      arrow-up
      0
      ·
      5 months ago

      The only passphrases I actually fully remember are the ones for drive LUKS and for the password manager databases.