Nevertheless I chose my Yubikey instead.

  • jard@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    7 months ago

    U2F on Bitwarden, in principle, doesn’t guard against attackers breaching into your accounts, as the Yubikey serves as a second factor during the authentication stage when the Bitwarden app retrieves the encrypted vault. Unless you combine a static secret from the Yubikey into the master password of the vault, an attacker could, in theory, steal your encrypted vault from the central Bit/Vaultwarden server or any device that’s already downloaded it (note that if this device is your phone, all conventional TOTP is thwarted anyways, so in general phones are the most lucrative target here.) From there, the strength of your master password becomes the only thing separating an attacker from access to all of your online accounts.

    I’m not saying that it’s a bad practice and you absolutely shouldn’t do it — I do it myself, as I trust the security of Bitwarden’s servers and my devices in keeping my vault safe. The salient point here is the burden lies on online services upgrading their outdated security options to support U2F, not on us settling with an objectively inferior 2FA option because these services are too lazy and slow.

    • Dislodge3233@feddit.de
      link
      fedilink
      English
      arrow-up
      3
      ·
      7 months ago

      I have a really long password on Bitwarden like 30+. I use OnlyKey to store this password on a hardware device.

      You mentioned phones. My problem with using another 2FA app is that it’s still on my phone.