Just wondering what people are using to meet the 2FA requirement GitHub has been rolling out. I don’t love the idea of having an authenticator app installed on my phone just to log into GitHub. And really don’t want to give them my phone number just to log in.

Last year, we announced our commitment to require all developers who contribute code on GitHub.com to enable two-factor authentication (2FA)…

  • @Tramort@programming.dev
    link
    fedilink
    9916 days ago

    It’s fine. The added security is huge

    The problem is when they want you to install their TOTP app in order to authenticate (I’m looking at you, steam… fuck off)

  • Scrubbles
    link
    fedilink
    English
    7016 days ago

    SMS is the least secure form of 2FA, and sim swaps are a very real thing. Whatever you’re issues with 2FA apps are, I can 100% say that you should be more concerned about actors getting access to your account.

    And this isn’t just GitHub. You should be using a 2FA app for allllll of your services. Breaches are a daily thing, your passwords are online and are available. 2FA may be the only thing defending you right now, and SMS 2fa or email 2fa I wouldn’t trust.

    • @peregus@lemmy.world
      link
      fedilink
      12
      edit-2
      16 days ago

      Totally agree! 2FA on all the accounts that support it avoiding SMS. And different passwords (complex, auto generated by a password manager) for each single account. I may be paranoid, but I also use a different email alias (SimpleLogin) for every single account! 😆

      • @nrbray@lemmy.ml
        link
        fedilink
        516 days ago

        same, a simple habit that is secure, I use it always with maximum privacy. One day you will be in a rush, under stress, affected by age, and use your old habits with a valuable asset…

      • @delirious_owl@discuss.online
        link
        fedilink
        4
        edit-2
        15 days ago

        Not if the org uses SMS auth as a recover method for your “lost” password

        Also putting a phone number into a DB means the attackers who dump the DB now have a very effective way to phish or exploit you with a large attack surface.

        I generally don’t let my team enter phone numbers into their account data.

      • Scrubbles
        link
        fedilink
        English
        316 days ago

        But it should be the last resort. It makes sense why it’s being phased out

        • lemmyvore
          link
          fedilink
          English
          216 days ago

          Well we could be using passkeys right now if Big Tech weren’t trying to tie them to their own platforms! 🤷

        • @refalo@programming.dev
          link
          fedilink
          215 days ago

          Unfortunately many banks still require it and have no other methods available. I tried to reason with my bank about it but they just do not care.

      • @delirious_owl@discuss.online
        link
        fedilink
        1615 days ago

        Yeah I just want to type my name to be able to withdraw money from my bank account. No pesky pins or passwords or any form of authentication /s

        • @Zeroxxx@lemmy.id
          link
          fedilink
          315 days ago

          Even in my bank’s ATM there’s only one password, not 2FA. 2FA is 2 factor auth, there’s no 2FA in the ATMs.

          It doesn’t mean the initial password isn’t a layer of authentication, but strictly speaking where I live all ATMs do not employ 2FA.

          • @vvv@programming.dev
            link
            fedilink
            715 days ago

            The two factors at an ATM are possession of your bank card + knowledge of your pin. (it also takes your photo, for good measure)

            GitHub will happily accept a smart card or whatever, if an extra plastic rectangle jives with you more than an OTP generator.

              • @Reddfugee42@lemmy.world
                link
                fedilink
                313 days ago

                “Something you have” is absolutely not equivalent to “something you know”

                You are completely unable to enter this conversation, but you think you’re the smartest one in the room.

                I bet you’re insufferable.

      • @Reddfugee42@lemmy.world
        link
        fedilink
        513 days ago

        Brilliant. Until that website’s unsalted pw database is downloaded through a SQL injection.

        Use both. You’re not smarter than security professionals.

        • @kevincox@lemmy.mlM
          link
          fedilink
          211 days ago
          1. Salt doesn’t matter if your password is unique.
          2. If they can download data via SQL injection having them log in probably doesn’t matter that much.
          3. If they can dump your password/hash they can likely also dump the TOTP secret.
          4. A lot of website security expert attention is focused on raising the minimum security level. If you are using randomly generated passwords + auto-fill you are likely above their main target audience.

          So yes, it is slightly better, but in practice that difference probably doesn’t matter. If you use U2F then you may have a meaningful security increase but IMHO U2F is not practical to use on every site due to basically being impossible to manage credentials.

          So yes, it is better. But for me using random passwords and a password manager it isn’t worth the bother.

      • @Miaou@jlai.lu
        link
        fedilink
        314 days ago

        The day your machine is compromised is also the day ALL your passwords get stolen.

      • @helenslunch@feddit.nl
        link
        fedilink
        19 days ago

        It doesn’t matter how random or secure your password is, it can still be compromised.

        2FA increases security and costs nothing in return.

    • lemmyvore
      link
      fedilink
      English
      416 days ago

      Also OTPclient on desktop, it can work directly with an Aegis encrypted export file. You enter the decrypt password when you open the app and it can auto-lock after a specified interval.

      • @Kess8a@lemy.lol
        link
        fedilink
        English
        216 days ago

        Is there something similar for windows? I check the github page & there doesn’t seem to be a package for windows. I could try to compile it from source but that a lot of libraries I have to get…

        • lemmyvore
          link
          fedilink
          English
          316 days ago

          If you’re willing to work with unencrypted exports I think tauthy can import unencrypted Aegis JSON format.

          Also, what Aegis exports as “text format” is a standard format of sorts that consists in lines of otpauth:// URLs. There are lots of apps that can import that format, but please note that you lose some extra information from Aegis when you export in that format. Shouldn’t be a problem if you just want to be able to generate codes on desktop.

    • @StorageBOP
      link
      English
      113 days ago

      Aegis looks great - I’ll give this a shot. Thanks for the recommendation!

    • @kevincox@lemmy.mlM
      link
      fedilink
      311 days ago

      Yeah, this is important to realize. Most good 2FA implementations offer TOTP which doesn’t need a proprietary app. You can store all of your 2FA secrets in whatever app or password manager you like.

    • @kevincox@lemmy.mlM
      link
      fedilink
      111 days ago

      The problem with Yubikey is that it doesn’t have a good enough management story for broad use. I do use it for a few core sites (like GitHub) but if I lose a key I need to get a replacement and register that replacement with every site I have set up U2F 2FA on. This is ok with a few core accounts but doesn’t scale to the hundreds of sites that I have an account with. I am sure to miss a few and then either I can’t log in with the new key or get completely locked out when I lose that key and get a second replacement.

    • @Tibi@discuss.tchncs.de
      link
      fedilink
      5
      edit-2
      16 days ago

      Agreed, me to! And I use syncthing to sync my database between my devices Edit: mine is called KeePassDX but its the same database file

  • @toastal@lemmy.ml
    link
    fedilink
    1216 days ago

    Ideally you don’t want to build your open source software on a proprietary forge service so hopefully nothing of value is on the Microsoft-owned platform so it doesn’t really matter how secure it is.

    But you should have a free software TOTP option on you anyhow. I use password-store’s OTP plugin so it is easier to back up & sync.

    • @fuzzzerd@programming.dev
      link
      fedilink
      516 days ago

      Did you forget the ./s or something? Lemmy itself is developed on GitHub, as are plenty of other “valuable” open source projects. To pretend nothing of value is built there is putting your head in the sand.

      If you’re developing software on GitHub you have a chance at getting some useful feedback, bug reports and maybe even PRs. Like it or not, the network effect is real.

      • @toastal@lemmy.ml
        link
        fedilink
        3
        edit-2
        15 days ago

        Not /s

        It is long past the time to move on. We don’t like the ads, gamified/corporate-friendly social media aspects, & enshitification of the web (which is why we are an Lemmy not Reddit), so why would we want that same platform for our code?

        Also Lemmy has every interest in moving as soon as ForgeFed is finalized & merged into a forge the can host since they want the same decentralized values for their forge as their forum/link aggregator platform and have publicly acknowledged it is a problem.

        Your projects should follow that example, if not your current projects at least future ones. These megacorporation are not our friends.

  • @Jayjader@jlai.lu
    link
    fedilink
    11
    edit-2
    16 days ago

    I already use pass (“the unix password manager”) and there’s a pretty decent extension that lets it handle 2fa: https://github.com/tadfisher/pass-otp

    Worth noting that this somewhat defeats the purpose of 2fa if you put your GitHub password in the same store as the one used for otp. Nevertheless, this let’s me sign on to 2fa services from the command line without purchasing a USB dongle or needing a smartphone on-hand.

    • @vvv@programming.dev
      link
      fedilink
      7
      edit-2
      16 days ago

      Your two factors shift to possession of your password vault + knowledge of the password to it. You’re okay IMO.

      You also still get the anti-replay benefits of the OTPs, though that might be a bit moot with TLS everywhere.

      • @Jayjader@jlai.lu
        link
        fedilink
        315 days ago

        You’re right, I should have been more specific.

        If you’re already storing your password using pass, you aren’t getting 3 factors with pass-otp unless you store the otp generation into a separate store.

        For services like GitHub that mandate using an otp, it’s convenient without being an effective loss of 2fa to store everything together.

  • Billegh
    link
    fedilink
    1016 days ago

    It’s fine. I moved to gitlab years ago for 2fa, so while this doesn’t affect me I would be entirely ok with normal 2fa.

    It is normal, right? Not a weird Microsoft 2fa requiring their app?

  • @Dymonika@beehaw.org
    link
    fedilink
    1016 days ago

    I don’t love the idea of having an authenticator app installed on my phone

    For anything? Why not? Surely you don’t believe SMS-based TOTP is safer, right?

  • @cmnybo@discuss.tchncs.de
    link
    fedilink
    English
    816 days ago

    I just use my password manager to generate the TOTP. There’s no way I’m going to install an app just to use a website.

  • Bob
    link
    fedilink
    816 days ago

    Its more secure and ssh keys are more convenient anyways