I am thinking about buying a pair of physical 2FA keys to protect my password manager and sensitive accounts. Which brand and model do you suggest?

If a model with open source firmware doesn’t come with big drawbacks, I’d prefer it, because I may learn from the source code and even contribute to it.

NFC is not necessary, and the keys should be USB-A. A fingerprint reader is welcome if the price doesn’t increase too much.

Thank you all in advance.

  • Matt@lemmy.ml
    link
    fedilink
    arrow-up
    2
    ·
    10 hours ago

    I use Yubikey 5C NFC. You can get it for ~29€ last time I checked.

    • sparkle_matrix_x0x@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      4 hours ago

      That’s cool, strange I didn’t stumble over it when I was searching for these keys. Have you got one? Is it durable?

      • fubarx@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        4 hours ago

        I got one years ago. Used it for quite a bit. Worked great, but I stopped using it when my daily computer didn’t have a USB-A port any more.

        You do have to remember what each numbered button is for.

  • Ghoelian@piefed.social
    link
    fedilink
    English
    arrow-up
    2
    ·
    13 hours ago

    I have a nitrokey which works great. Only downside is the software isn’t as user friendly, you need to set it up using the cli.

    • sparkle_matrix_x0x@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      13 hours ago

      I am fine with a cli, I use arch btw.

      How long have you had your nitrokey? Others are concerned about their durability…

      Have you ever had a yubikey?

      • Ghoelian@piefed.social
        link
        fedilink
        English
        arrow-up
        2
        ·
        12 hours ago

        I’ve only had the nitrokey for a few months, so can’t comment on the durability yet.

        I did have a yubikey before. My experience with them wasn’t great, I often had to re-plug in the key because the touch to activate thing was pretty unreliable for me, often just not responding to touch at all.

        Though ultimately the reason I chose nitrokey is because I was just looking for a European alternative.

  • Godort@lemmy.ca
    link
    fedilink
    arrow-up
    10
    ·
    edit-2
    3 hours ago

    Yubico is industry standard for a reason. The current 5 model will have all the features you need and they are basically indestructible.

  • stupid_asshole69 [none/use name]@hexbear.net
    link
    fedilink
    English
    arrow-up
    7
    ·
    edit-2
    21 hours ago

    Your only “good” option is yubikey. They’ve been around comparatively forever, have all the problems worked out and make durable hardware. All that matters because you don’t want to get something from a company that goes under in a few years and leaves you high and dry and you don’t want the dongle to break because that’s your authentication, now you’re locked out of your shit.

    I recommend against getting some doodad with a biometric reader. You’re adding complexity, attack vectors and not getting much out of it plus you’re locking yourself out of deniability and the possibility of handing a trusted person your dongle, telling them your password and having them act in your stead.

  • turtl@lemmy.ml
    link
    fedilink
    arrow-up
    6
    ·
    21 hours ago

    Why do folks seem to prefer Yubikey over alternatives like Nitrokey or Token2?

    • utopiah@lemmy.ml
      link
      fedilink
      arrow-up
      3
      ·
      9 hours ago

      So far nobody provided a good answer (if I missed it, I apologized, please do share) so I’m going to assume it’s the typical “Nobody ever get fired for buying from IBM” mindset, namely rely on what is the most popular, confirm it works well while ignoring viable alternatives IMHO, e.g NitroKey.

      • Godort@lemmy.ca
        link
        fedilink
        arrow-up
        2
        ·
        3 hours ago

        I’m going to assume it’s the typical “Nobody ever get fired for buying from IBM” mindset

        That’s pretty much it exactly. Yubico has the required features, are widely supported, and are widely used. They have a track record of reliability.

        Other viable alternatives definitely exist, but they don’t have the same real-world penetration. The disadvantage with that is if you run into a platform-specific issue, finding someone who has had the same issue before and posted the solution somewhere becomes far less likely.

        • utopiah@lemmy.ml
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          3 hours ago

          if you run into a platform-specific issue

          Well that’s of course possible but in theory (which is so different from practice, I get that) if it relies on protocols or specifications rather than vendor specific implementations, e.g. OTP, TOPT, HOTP, U2F, OpenPGP, WebAuthN, etc then it should be fine.

  • monovergent@lemmy.ml
    link
    fedilink
    arrow-up
    7
    ·
    22 hours ago

    The firmware isn’t open source and I only chose it for the employee discount, but the blue Yubico security key has held up well over hundreds of uses and several years jingling around in my keychain.

    • Cat_Daddy [any, any]@hexbear.net
      link
      fedilink
      English
      arrow-up
      7
      ·
      22 hours ago

      Was going to say Yubikey also. I don’t like that it’s not open, but I’ve had open firmware keys before and they broke after several months of use. Meanwhile, my Yubikey has been kicking it on my keychain for almost fifteen years without any signs of wear, other than the paint scraping off of it.

  • solrize@lemmy.ml
    link
    fedilink
    arrow-up
    4
    ·
    22 hours ago

    Do you mean TOTP? FIDO? Or what? FOSS ones exist but they might not do exactly the right thing. I’ve had some ideas for self-built too. What would you do on the host interface side? Wouldn’t you want the host to not have the secret?

    It’s an interesting question.