alex2yub wrote:
Does it mean I killed one of my keys?
No, in as far as I can tell from what you posted here, your key is allright.
alex2yub wrote:
Can I reprogram it back to Yubico AES key?
Yes you can, but either you need to create your own key and upload it to the Yubico server - see
http://yubico.com/developers/aeskeys/ - or you need to retrieve the original AES key from Yubico. The latter may prove to be a bit difficult, as Yubico used to require 2 Yubikey generated OTP's + some proof of purchase of the key. There seems to be a better way now, please read
viewtopic.php?f=5&t=108&p=503#p503On my keys they fixed a little label, that contains a barcode and a number. They uniquely identify your key, so Yubico probably will be able to retrieve your secret. However, you need to prove your identity to them (CAcert?) perhaps you still have a proof of purchase, perhaps Yubico maintains records of which keys they shipped to whom. It all depends on their willingness to compromise security
alex2yub wrote:
Isn't Yubico AES key built in the config utility?
No, it is not. The AES key is available to the party that programmed the key; for a default key that would be Yubico. If you program your own key, you are the only party that has the key.
alex2yub wrote:
How do I use your config utility to add config1 protection against reprogramming, let say, and not destroy that key's compatibility with Yubico servers? I don't see how.
I hadn' thought of it but yes, that's an interesting question: can you add password protection to a key WITHOUT reprogramming it? I dont' know, but perhaps one of the Yubico people can answer this?
alex2yub wrote:
Is it safe to add a second config (static PW) for my working key? Will config1 still work with Yubico servers?
Same anwer as to the last question..