this post was submitted on 28 Jan 2025
251 points (96.7% liked)

Technology

61227 readers
4291 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Bitwarden users who store their email account credentials within their Bitwarden vaults would have trouble accessing the sent codes if they are unable to log in to their email.

To prevent getting locked out of your vault, be sure you can access the email associated with your Bitwarden account so you can access the emailed codes, or turn on any form of two-step login to not be subject to this process altogether.

you are viewing a single comment's thread
view the rest of the comments
[โ€“] eager_eagle@lemmy.world 49 points 3 days ago (3 children)

using a password manager without 2FA is insanity, glad they're doing it

[โ€“] IDKWhatUsernametoPutHereLolol@lemmy.dbzer0.com 0 points 22 hours ago* (last edited 22 hours ago)

Insanity is doing such a drastic chance on less than 3 days notice, a change that could potentiallt lock out people that aren't very tech savy, and only found Bitwarden by a techy friend's recomendation, or just happened to see it on their phone'a app store.

Absolute Shitshow ๐Ÿคก

3 days notice lmfao, Fuck Bitwarden

Keepass all the way!

Edit: And its not really a 3 day notice. The first real email notice I got was Jan 30 morning at EST, just a few hours ago. February is like less than 48 hours. Wtf

[โ€“] Giooschi@lemmy.world 37 points 3 days ago (3 children)

Insanity is when you lose or can't access your 2FA device and you're locked out of your account.

[โ€“] iAmTheTot@sh.itjust.works 33 points 3 days ago (2 children)

That's what recovery codes are for.

[โ€“] Giooschi@lemmy.world 18 points 3 days ago (1 children)

Sounds like a second password then.

[โ€“] acosmichippo@lemmy.world 23 points 3 days ago (1 children)

...which you keep in a separate secure location in case you lose your 2FA device.

[โ€“] Giooschi@lemmy.world 8 points 2 days ago (2 children)

Why can't I keep my password in a secure location then?

[โ€“] acosmichippo@lemmy.world 7 points 2 days ago* (last edited 2 days ago) (1 children)

obviously you do but it can be leaked, phished, or hacked in other ways. a second "factor" such as possession of a token device is a safeguard against that.

you can actually read about all this many places online, it's nothing new: https://en.wikipedia.org/wiki/Multi-factor_authentication

[โ€“] Giooschi@lemmy.world 0 points 2 days ago (1 children)

From the wikipedia link you posted:

Account recovery typically bypasses mobile-phone two-factor authentication

It also lists more advantages than disadvantages.

[โ€“] acosmichippo@lemmy.world 6 points 2 days ago* (last edited 2 days ago) (1 children)

yes, that's the whole point, to recover your account if you lose your MFA device. what are you even trying to say?

edit:

the article lists 3 very important advantages, and 9 relatively small/niche disadvantages (or even irrelevant in the case of SMS). mobile MFA makes sense for the vast majority of people, of course there are always edge cases who it may not work for.

[โ€“] Giooschi@lemmy.world 1 points 2 days ago (1 children)

yes, that's the whole point, to recover your account if you lose your MFA device. what are you even trying to say?

If you can login without the second factor then what's the point?

[โ€“] acosmichippo@lemmy.world 2 points 1 day ago* (last edited 1 day ago) (1 children)

We already covered this at the top. You keep the recovery codes unexposed to the internet or obfuscated in some way, unlike your usual password. Therefore you can have confidence that they haven't been hacked, leaked, or whatever like passwords often are.

anyway I tire of your sea lioning. if you are truly asking good faith questions you can research on your own from here.

[โ€“] Giooschi@lemmy.world 2 points 1 day ago

You keep the recovery codes unexposed to the internet or obfuscated in some way, unlike your usual password.

How is a strong password I used exclusively for Bitwarden "exposed to the internet"? I do see the value of this for people that don't care about security and reuse the same password everywhere. In that case you would need something like phishing to expose the 2FA code or the recovery code, just a leak of the email-password combination from another website would not be enough. But what's the point if I'm already using a unique strong password specifically for Bitwarden?

[โ€“] umbrella@lemmy.ml 0 points 1 day ago* (last edited 1 day ago)

shit, why can't i just keep the secondary password instead of relying on notoriously insecure sms, or notoriously privacy invading email?

why am i forced in some instances to rely on third parties?

[โ€“] acosmichippo@lemmy.world 11 points 2 days ago* (last edited 2 days ago) (2 children)

I can't believe people are arguing about and downvoting this. Especially for a service that holds all of your passwords, it's the highest priority thing for you to secure.

[โ€“] xigoi@lemmy.sdf.org 1 points 1 day ago (1 children)

Me losing my devices is much higher on my threat model than someone trying to brute-force my Bitwarden password.

[โ€“] acosmichippo@lemmy.world 3 points 1 day ago* (last edited 1 day ago) (1 children)

/1. we've covered this already. that's why recovery codes exist.

/2. losing your device is not a threat to your accounts saved in bitwarden, you'd just have to reset your passwords. it sucks, but that's not a security threat.

/3. there's way more than brute-force attacks out there.

[โ€“] jim@programming.dev 1 points 1 day ago (1 children)

This is being purposefully obtuse. Choosing to force users to memorize a recovery code increases the likelihood of lock outs.

There is a real risk of account lockout, especially for those of us who travel frequently. Lockouts are a significant risk when you need to carry all your belongings and devices.

There are also some of us who also think about what happens to us when we are incapacitated and a loved one needs access to our passwords. In a situation, it's important to balance security vs expediency to access critical information. This new policy disrupts that.

At the very least, I wish Bitwarden would have given us more time to force this policy. I have to scramble to make changes to my estate planning documents and get in contact with my lawyer to change my advanced healthcare directives.

[โ€“] acosmichippo@lemmy.world 1 points 23 hours ago

Choosing to force users to memorize a recovery code

now who's being purposefully obtuse.

[โ€“] kata1yst@sh.itjust.works 1 points 2 days ago

Never underestimate the human capacity for short-sighted laziness.

[โ€“] Kusimulkku@lemm.ee 8 points 3 days ago* (last edited 3 days ago)

Recovery codes.

[โ€“] eager_eagle@lemmy.world 7 points 3 days ago* (last edited 3 days ago)

insanity is also relying on a single 2FA device, ffs

  • Have multiple factors
  • 3-2-1 vault backups
  • Setup emergency access if you have a person you trust
  • Keep at least one device with BW synced at any moment, so you have offline access
[โ€“] 9tr6gyp3@lemmy.world 8 points 3 days ago (3 children)

Where do you store your 2FA recovery codes?

[โ€“] Engywuck@lemm.ee 16 points 3 days ago (1 children)
[โ€“] 9tr6gyp3@lemmy.world 7 points 3 days ago (1 children)

Well thats a good way to lock yourself out of your account!

[โ€“] Engywuck@lemm.ee 14 points 3 days ago

Well, not really. Vault is cached on your devices, so if you have it unlocked or available on one of them you can always use it to check your 2FA.

By the way, it was a joke. I also use Aegis as a backup.

[โ€“] fushuan@lemm.ee 3 points 2 days ago* (last edited 2 days ago)

On my home PC. Same with the 2fa export of aegis.

~~"What if you can't access blah"~~

~~There's a limit to interoperability, if you want access to everything everywhere even when you lose access for whatever reason, you will have to concede security.~~

~~You could save a keepass file with secure notes of both the bitwarden 2fa and recovery codes and save it in drive or whatever, you don't need passwords nowadays to access the Google account.~~

~~"But what if I lose access to my phone?"~~

~~Well you are fucked, what else do you want? I guess you could print the recovery keys and store them in a secured box at home.~~

Edit: I read further down that your comment was meant to incite other to actually think and do stuff. Sorry if I came of rude.

[โ€“] acosmichippo@lemmy.world 4 points 2 days ago* (last edited 2 days ago) (1 children)

two places:

\1. secure location in your home (physical copy in a safe or a digital copy on an encrypted disk)

\2. in case of a disaster like a home fire where you lose the 2FA device and local backup: in a remote location such as an encrypted file in a cloud service or at a trusted friend/family's house.

[โ€“] 9tr6gyp3@lemmy.world 5 points 2 days ago (1 children)

I know the recommendations. Im suggesting that everyone take a look at those practices and be sure to have them implemented.

If you're not printing out the codes on paper and sticking them in a safe deposit box as a remote backup, you're absolutely risking it.

[โ€“] acosmichippo@lemmy.world 1 points 2 days ago (1 children)

ok, sorry for answering what appeared to be a genuine question.

[โ€“] 9tr6gyp3@lemmy.world 1 points 2 days ago

Nah you hit the nail on the head. I 100% agree with you. Sorry if I came off brash.