Hello All,
As part of Yubico's testing of the U2F devices before the launch of the first U2F Client browsers we tested across multiple configuration on the YubiKey. The YubiKey NEO and NEO-N have no issue in supporting the three modes; One-Time Passwords, Smartcard (CCID) and U2F. However, when testing the NEO against the U2F Client browser, it turned out that the combination of U2F in addition to the OTP mode was not supported by the browser client itself.
That being said, the beta version of Chrome (Chrome 39) supports all the modes of the YubiKey NEO, and we expect future browsers to support the OTP and U2F concurrent configuration as well. Once there is a public release of a U2F browser which can support OTP and U2F modes at the same time, Yubico will release a new version of the NEO Manager with the mode limitation removed. For users who don't want to wait, you can also use the yubikey-personalization (
https://developers.yubico.com/yubikey-personalization/) Command line tool to enable all modes on your YubiKey NEO or NEO-N.
Download the personalization command line tool from here:
https://developers.yubico.com/yubikey-personalization/Releases/Extract the files and then run the ykpersonalize tool like so:
ykpersonalize -m6
Mode 6 is the OTP+U2F+CCID mode (and isn't listed in -help, which means if you aren't on a linux machine you don't have access to the manpage and have to go searching through source code to find the applicable mode)
You can now use your Yubico NEO (purchased starting in Oct 2014) with both LastPass in OTP mode and with Google U2F.
EDIT:We've had reports of users with bricked YubiKey NEOs and NEO-n's after using the personalization command line tool incorrectly. Please refrain from using the command line tool if you are not familiar with the personalization tools or command line interfaces; there are no safeguards for keeping users from getting their YubiKeys in an inoperable state!
_________________
-David Maples
Yubico Senior Solutions Engineer
http://www.Yubico.com