It sounds wonderful in theory, but in practice the state of the art in OTP dongles leaves much to be desired. I got a Nitrokey. I followed the instructions on the web site. It didn't work. I contacted the company. No response. I am now the proud owner of a very expensive but slightly undersized domino.
It's not really about the money. The cost of a nitrokey is not going to send me to the poorhouse. And I'm still hoping I can get it to work. But I thought I should put out my experience as a PSA datapoint.
I love U2F and wish more websites supported it. I bought two nano YubiKeys (they fit almost completely inside a USB port, just sticking out enough to touch the capacitive edge or dig out with a fingernail). I keep one in my laptop and one on my keychain (the keychain one also has NFC which, someday, should let me authenticate my phone).
Chrome's U2F support has worked flawlessly for me — when a website wants to register or check the token, an LED starts flashing and you touch the edge of the token to give it permission to respond. That's it — no more digging for my phone to get codes.
This looks like the same folks at https://twofactorauth.org/
I was surprised for a moment to see my company (directnic.com) on there when we hadn't submitted, but then realized its very similar design/layout
I always have issues using u2f at my college. I'm not sure if it's some crazy configuration the IT department did or just windows is shitty, but it never works. Minimal problems on my own machine running Linux, but 2FA needs to work everywhere
Being a .info site, it's surprising this site has zero information on /why/ USB dongle authentication is important to have. The tweets it helps you make just say "it's important" and link to this website.
With external software providing the clock, you can use TOTP. I use https://github.com/zeteticllc/onetime on my mac with a yubikey for TOTP apps that don't yet support U2F.