Quote:
Please let me know if there is something I've missed here.
Its a very simple one, your product produces the password in static mode. This severely limits its use with applications where the password, or "key" has already been implemented or with products where it produces the pass phrase.A simple example is one that I read on this very forum....A Wireless router. I cant speak for all brands, but my router lets me select a "mode" of encryption (WEP , WAP) etc, and then automatically generates a series of keys...Much like how your product works. If a person does not wish to store this information on say a wireless laptop and wants to use the Yubikey for manual insertion of that pass phrase than they can not use your product....at least not a way that I can figure out. I fully admit that I am not a "professional" coder, and maybe I am missing something here.
This is just one basic example of why the Yubikey should be able to be programmed with my own password rather than relying on your system to make one. For instance I have a web based CRM system that will be accessed by some of my business partners. The system already automatically generates a long 32 caricature user ID string that uniquely identifies each user. This ID is also used to manage the account and link other data that requires the ID string to remain static as I have bridged multiple systems together and that unique ID sting is used throughout the system to manage data for that user as well. The entire process is automatic when a new user is created and makes a phrase like this one
Example: 7iLd=R0mKS*wsU$c4Gonbl}P0&i>&ok[I had planned on programming the Yubikey with the ID string and use it as the password for access. In my case, I would have to manually access every bridged system and change the ID string to match what your configuration tool gives me, rather than the other way around. For obvious reasons that is not practical. My CRM uses other methods to help secure the server such as GEOIP location, user agents ID, DPI (deep packet inspection) and proxy detection so at least for my use some of your advanced "features" are not desirable or applicable. Also I do NOT want to implement the use of your authentication server to validate my key since I wish to have complete control in house.
So while I think this product is great, and I may still yet find a method to apply it to my existing systems, the inability to use my own static passwords makes it hard to implement without fundamentally rewriting how my system works......Not to mention the problems of implementing it for use where a user is not able to supply the pass phrase, such as the case of the Yubikey 2.0. I believe that you may find more customers using your product if you simply offer them the option rather than imposing your own restrictive configuration tool.
As mentioned, I watched YOUR video where it clearly showed how to insert your own static password, (obviously outdated) and it was that EXACT feature I was drawn too. I did read the PDF user manual before purchase, admittedly rather quickly but nowhere did it state that the version 2.0 Yubikey would NOT allow me to use that function. You should remove that video from your YouTube channel and replace it with a current one.
OR, as I am some others would agree....return the function that allows me to program the key per my requirements or needs. While its obvious that your product is intended to produce the most secure tool you can, I think that you may have "
over-engineered" the process and limited its application to those like myself who wish to use it as just one part of a larger security/authentication system.