On Wed, Sep 4, 2024 at 6:47 AM Bernardo Reino via mailop <mailop@mailop.org>
wrote:

> On Sun, 1 Sep 2024, Viktor Dukhovni via mailop wrote:
>
> > The flaw for me is that TOTP involves using phone apps I don't know
> > the provenance of, that back up the data in a format I don't know
> > to my "Google Drive", which is the most protected place I'd choose.
> >
> > If the app I'm using stops being available, I don't currently a
> > have a good recovery plan.  What do you use to keep your TOTP
> > data safe and sufficiently portable between "devices"?
>
> For Android I use "aegis", which allows exporting the TOTP data, so you
> can save
> the file anywhere.
>
> I save that file in my local linux box (and in a remote VPS), encrypted
> with
> gpg, and have a script which decrypts it and dumps the current TOTP codes
> using
> the "oathtool" program (debian: oathtool package).
>
> This way even if my phone is not available, I can still generate the TOTP
> codes
> using any standard linux box (or ssh'ing to that VPS). This is (to me) as
> portable as it gets.
>
> Hope that helps!
>
> PS: in parallel to aegis I also save the TOTP data in my self-hosted
> Bitwarden
> (vaultwarden) instance.
>
> PPS: recent events have caused me to (re-)consider how to deal with me not
> being
> "available" and e.g. my wife having to take over the (large,
> unfortunately)
> number of accounts "protected" with 2FA/TOTP. It's a serious DoS issue
> that
> everyone should consider and plan for (IMHO anyway).
>

Yeah, and if you really want to roll your own, TOTP is a standard and
widely available implementations,
such as https://github.com/susam/mintotp/blob/main/mintotp.py

And that PPS, yeah, the complexity of that is very challenging.

Brandon
_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to