I have read quite a few posts about preventing account password takeover from various malicious ways, and many OPSEC measures are there to prevent it from happening.

Consider a case where you face a total blackout or technical failure. Now, you need to log in to your password manager, which requires either OTP on email or TOTP. You don’t have access to the TOTP app because the backup is stored in cloud storage, whose email login also requires OTP.

How would you prevent such from happening?I haven’t found a satisfactory solution or explanation for that yet.

  • m-p{3}A
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    8 months ago

    A strong and unique passphrase is indeed really important here, but you need to keep in mind that once the kdbx file is in the attacker’s hand, that’s the only thing that keep them out.

    There’s no 2FA, and no throttling on the bruteforce process. So it’s really important to use a strong password there to avoid it being the weakest link.

    • catloaf@lemm.ee
      link
      fedilink
      English
      arrow-up
      3
      ·
      8 months ago

      You can kind of do MFA on the database. You can require a key, which can be very long and complex, and you can store it on a USB drive. You might be able to use a key stored on a yubikey or something too, I haven’t tried it. It probably depends on which KeePass variant you’re using.

      • sntx@lemm.ee
        link
        fedilink
        arrow-up
        1
        ·
        8 months ago

        I use KeePass with three factors:

        • The password
        • A keyfile I distribute out of band between all hosts that should be able to open the database
        • A set of Hardware Keys supporting challange-response

        Works really well IMO. I use KeePassXC on Linux and KeePass2Android on Android.