My short answer: no, you can't export the keys from Google Authenticator
that I'm aware of. You'll have to log in with your old otp and generate
new "tokens". Some ideas for moving forward though: the Authy app does
sync between devices and we've tested it, Google Authenticator, and
FreeOTP using the time-based TOTP codes on multiple devices concurrently
(they all have to snap the same QR code). I don't know if Authy will
work with counter-based HOTP if that's what you're using, but it was the
only one that would backup/sync across devices.
Another idea is to put the text version of the OTP key in your password
manager of choice on token generation. The Enpass password manager will
actually let you add the TOTP QR code into the account info with your
device's camera. You could re-enroll your devices later if need-be.
Before anyone yells at me: yes, I realize that putting the password and
the OTP generation key in the same place kind of defeats the purpose. If
someone breaks into your password manager though, you likely have a
bigger problem than your password and otp key being in the same record.
Use your best discretion on this. Yes, I'd do this for my Steam account.
No, I would not do it for work.
We run FreeIPA servers for 2fa. For the most part, Google Authenticator,
Authy, and the FreeOTP apps are all about the same with the only
exception being neither Authy or Authenticator worked with TOTP using
SHA256 at the time of testing, but SHA1 worked just fine. All three apps
generated the same codes in the same timeframes using SHA1. If you're
already using Authenticator, then the SHA256 compatibility thing won't
be an issue (just something to note for anyone facing this problem in
the future).
Happy 2FA'ing,
Thaddeus
On 7/28/17 12:41 PM, Matthew Eastman wrote:
On Fri, Jul 28, 2017 at 12:39 PM, <[email protected]> wrote:
Pretty much what I ran into with one clarifiation:
As far as I know, there's nothing preventing you from installing the app on
multiple devices and entering the same code into both separately. The
obvious drawback is you now have to maintain control of multiple device
constantly in order for the second factor to actually enhance security.
This is certainly true for TOTP codes, which are most prevalent,
though Google Authenticator also supports HOTP, in which case there's
a sequence number that won't be kept in sync between the devices.
Thanks,
On Fri, Jul 28, 2017 at 11:05:07AM -0500, Joe Fruchey wrote:
I use Google Authenticator. I don't think you can have multiple devices
active concurrently, nor can you export the keys. I think the proper way
to transfer to a new device is to decomm the old one by disabling 2FA,
then set it up again on the new device. One way to avoid this is to
print/save the QR code on the initial setup, but once it's gone, there's
no way to retrieve it.
On Fri, Jul 28, 2017 at 10:14 AM, <[1][email protected]>
wrote:
We recently were forced to start using 2FA for a service at work and,
as I agree with the practice (at least in principal), I started using
Google Authenticator for several other services, including sudo on a
couple of Linux boxes I have.
Now I'm facing a phone that desperately needs to be replaced but
authenticator codes locked into the software on that one device. I know
I can get new codes for all of my existing services and just set it up
fresh on a new device but I'm curious how that's "normally" handled. I
wouldn't necessarily have that option if I chucked my phone into a brick
wall as I have been sorely tempted to do on multiple occassions lately.
Do you backup your authenticator keys somewhere? If so, how?
Set it up on multiple devices under the assumption that at least will be
functional long enough to reset codes with the services?
Do you avoid 2FA specifically because of this issue?
Something else totally obvious that I just missed?
Thanks,
Bill
_______________________________________________
General mailing list
[2][email protected]
[3]http://brlug.net/mailman/listinfo/general_brlug.net
References
Visible links
1. mailto:[email protected]
2. mailto:[email protected]
3. http://brlug.net/mailman/listinfo/general_brlug.net
_______________________________________________
General mailing list
[email protected]
http://brlug.net/mailman/listinfo/general_brlug.net
_______________________________________________
General mailing list
[email protected]
http://brlug.net/mailman/listinfo/general_brlug.net
_______________________________________________
General mailing list
[email protected]
http://brlug.net/mailman/listinfo/general_brlug.net
_______________________________________________
General mailing list
[email protected]
http://brlug.net/mailman/listinfo/general_brlug.net