JakobE,
I’ll reply using the same outline you use so my answer a) corresponds to your statement a) and so on.
a) This statement is akin to me selling you a V8 engine and telling you that it delivers 400 horsepower without also adding the caveat that “ V8 engine delivers 400HP when all 8 cylinders are enabled, and I only enabled 4”. Your static page reference in the Yubico site need to explicitly say something to the fact that the 64 character password is limited to a ModHex16 and enumerate those characters. The page leads people to believe that one is capable of putting any text string in the static password mode and that is just not the case.
b) Indeed what I used was the Windows Yubikey Configuration Tool. Again I’ll take full responsibility for not diving into the bowels of the documentation before buying Yubikeys instead of only relying on the statements on
http://www.yubico.com/developers/static/ .
c) I have used my own seeding the HEX values from separate runs of grc.com/password to input into the public, private and ID. I don’t really want more than 256 bits however repeated testing of using seeds from known good random HEX code from grc.com/passwords, the build in calls to GenCryptRandom, and using the “Single Rand” option the best I can get to output from the final 64 character password in the Yubikey is 157 bits – that is quite shy of 256.
d) 32 or 38 characters clearly increase the depth to the capacity of the static mode password of the yubikey. However if you still have no way to allow the end user to program their own static password without the use of a Hex string it will still be less than the theoretical best it can achieve because it will still rely on either a call to CryptGenRandom or static Hex input from a user.
e) I’d love to have the skillset to program in a relatively modern language and generate a strong RNG that I can share with this community. However I don’t have time to learn a programing language at this time to accomplish this so I’m stuck using the formats available on the Yubico program.
I’m not into getting something for nothing; this is not at all my intent. Can the keys I own be sent back to Yubico to be reprogramed with the new firmware? If not I’ll take responsibility for not reading all the documentation and just suck it up and drive on, for me and my company the money is not the issue here. The issue is that we expected to get a given capability and the device can’t deliver it.
You have no idea how badly I want this to work as advertised. I love the idea of having a self-selected 64 character password in my YubiKey. I want to be able to show this to our clients and explain to them that they must buy this, that they must use it for the sake of securing their data (you know with TrueCrypt full disk encryption).I want to be able to tell them that they need to use a Yubikey OTP for their Active Directory logons and for their Firewall based VPNs (via a RADIUS solution). It pains me that we aren’t there yet.