Regarding Issue 126802, UI for creating Chrome Device hostnames, can this be in the Admin control panel
Reported by
mike.el...@communitychoice.us,
Dec 21 2016
|
|||||||||
Issue descriptionUserAgent: Mozilla/5.0 (X11; CrOS x86_64 8872.70.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.87 Safari/537.36 Platform: 8872.70.0 (Official Build) stable-channel panther Steps to reproduce the problem: 1. Open network router 2. Search for connected equipment 3. No information on Chrome OS devices What is the expected behavior? The ability to give devices on the network a name so they can be easily identified. Easier than identifying by IP address. What went wrong? They don't currently do this, https://bugs.chromium.org/p/chromium/issues/detail?id=126802#c64 Did this work before? No Chrome version: 55.0.2883.87 Channel: stable OS Version: 8872.70.0 Flash Version: Shockwave Flash 23.0 r0 I'm unable to comment in the other thread, but I would like to request that this ability to add hostnames, if it is ever added, be added into the G Suite administration panel under Chrome Devices so I can assign hostnames to all my devices from a single convenient location.
,
Jan 2 2017
,
Jan 2 2017
,
Jan 2 2017
,
Sep 22 2017
This is a HUGE need for us. Please, Google, help with this situation.
,
Sep 22 2017
I would like to be able to do this also for my devices. Please add the feature.
,
Sep 22 2017
Without having the hostname configurable and available, it makes troubleshooting wireless, dhcp, etc issues difficult. Please add this so that we can add a hostname to our devices and then identify them in our router, switch, dhcp, etc client lists where connected hostnames are displayed. Thanks!
,
Sep 25 2017
This is a HUGE need for us, also. Please, Google, help with this situation.
,
Sep 27 2017
This would be a great help to us as well. Please Google.
,
Oct 5 2017
The policy will be surfaced as a string in the admin UI. Values:
(default) no policy: No DHCP option 12 attached - Existing behavior
Policy=xxx xxx
Policy=${ASSET_ID} Device's asset ID [1]
Policy=${SERIAL_NUM} Device's serial number
Policy=${MAC_ADDR} Device's MAC address
Policy=xxx+VAR+xxx xxx+VAR_VALUE+xxx
[1] https://chromereleases.googleblog.com/2015/04/admin-console-update_8.html
,
Oct 5 2017
,
Oct 5 2017
So if we say that we have only 3 variables (ASSET_ID, SERIAL_NUM, MAC_ADDR) and we do simple case-sensitive string substitution for them, then we actually have only two options: (default) no policy: No DHCP option 12 attached - Existing behavior Policy=xxxVARxxx xxxVAR_VALUExxx But we would need to validate hostname after, and this brings us to question "What to do if resulting hostname is invalid?". We do not want to set invalid host name, as it might either result in rejected DHCP request, or be a way to exploit DHCP server vulnerabilities. And at this point there are few ways we can use to indicate errors: system logging and setting some message-containing host name.
,
Oct 5 2017
I'd like for Cpanel to detect invalid hostnames, since this is the best place for the user to notice the error. If an invalid hostname somehow makes it into the policy, shill can drop it and log an error. This shouldn't normally happen, of course. FWIW: 1) I don't see any validation of kHostnameProperty (hostname_) happening in $SHILL/dhcp/dhcpv4_config.cc so we should check that. Same for vendor_class_. Seeing string properties from Chrome getting copied directly into subprocess command-line arguments makes me nervous. 2) DhcpProperties::kHostnameProperty and DhcpProperties::kVendorClassProperty should probably be moved into dbus-constants.h in the system_api package so that Chrome can use them.
,
Oct 6 2017
Re: cpanel detection, is this actually viable if we do client-side substitution of things like Asset ID?
,
Oct 6 2017
Btw, Asset ID seem to have no validation - it can be arbitrary long, start with digits, contain weird UTF symbols, etc. I believe we should have defend-it-depth here: sanity checks on at least 3 layers: ChromeOS (shill), Chrome (layer that applies policy) and CPanel (to prevent absurd values in policy).
,
Oct 6 2017
If the Asset ID field is less restrictive than the Hostname field by design, I would suggest substituting (say) '_' for any disallowed characters found in the Asset ID, when shill creates the parameter to pass to dhcpcd. For substitutions like "append the last 3 octets of the MAC address" (found in the doc we discussed over email), that should not present a validation problem, unless the final hostname string is too long.
,
Oct 6 2017
tbh I would prefer not to work too hard on ensuring sanity of hostname. The admin is responsible for creating hostnames that fit into whatever use case they want to aim for. We can add warnings to admins so that they understand what they are getting themsevles into. But wouldn't do things like changing non-characters into _ and such. Seems quite overkill and unpredictable from an admin's perspective.
,
Oct 6 2017
I normally wouldn't care either, but letting bad strings percolate into dhcpcd parameters or DHCP options could create security issues for software that isn't designed to handle them.
,
Oct 19 2017
"_" isn't valid in DNS labels, only [-0-9a-zA-Z]
,
Oct 27 2017
This is a limitation of hostnames, not a DNS limitation. (DNS is not just for hostnames and hostnames are not just in DNS) https://en.wikipedia.org/wiki/Internationalized_domain_name#Internationalizing_Domain_Names_in_Applications
,
Dec 4 2017
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/339c49a48ae67a0a070c3f9c954a5a52c54057e1 commit 339c49a48ae67a0a070c3f9c954a5a52c54057e1 Author: Denis Kuznetsov <antrim@google.com> Date: Mon Dec 04 01:03:37 2017 Add a policy to specify device Hostame in DHCP request. Bug: 676195 Change-Id: I450fcf3416f620ce9867d55ea225c610583d1169 Reviewed-on: https://chromium-review.googlesource.com/764168 Reviewed-by: Steven Bennetts <stevenjb@chromium.org> Reviewed-by: Julian Pastarmov <pastarmovj@chromium.org> Reviewed-by: Sergey Poromov <poromov@chromium.org> Commit-Queue: Denis Kuznetsov <antrim@chromium.org> Cr-Commit-Position: refs/heads/master@{#521241} [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chrome/browser/chromeos/BUILD.gn [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chrome/browser/chromeos/policy/browser_policy_connector_chromeos.cc [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chrome/browser/chromeos/policy/browser_policy_connector_chromeos.h [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chrome/browser/chromeos/policy/device_policy_decoder_chromeos.cc [add] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chrome/browser/chromeos/policy/hostname_handler.cc [add] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chrome/browser/chromeos/policy/hostname_handler.h [add] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chrome/browser/chromeos/policy/hostname_handler_unittest.cc [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chrome/browser/chromeos/settings/device_settings_provider.cc [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chrome/browser/chromeos/settings/device_settings_provider_unittest.cc [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chrome/test/data/policy/policy_test_cases.json [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chromeos/network/network_state_handler.cc [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chromeos/network/network_state_handler.h [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chromeos/network/shill_property_handler.cc [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chromeos/network/shill_property_handler.h [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chromeos/settings/cros_settings_names.cc [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/chromeos/settings/cros_settings_names.h [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/components/policy/proto/chrome_device_policy.proto [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/components/policy/resources/policy_templates.json [modify] https://crrev.com/339c49a48ae67a0a070c3f9c954a5a52c54057e1/tools/metrics/histograms/enums.xml
,
Dec 4 2017
,
Jan 26 2018
Hi, may I know where's the fix or feature got applied? Is it in the Admin Console? Any help and answers will be much appreciated. Thank you!
,
Jan 29 2018
You configure a device name in Admin Console. Then you take some router that supports and see that after device connects to router, you check that there is a dhcp client connected with a given name.
,
Jan 29 2018
The admin console setting is planned for end of March, early April. We will update this bug once the setting is surfaced.
,
Mar 21 2018
are you guys still on track to have this feature available by end of March, early April?
,
Apr 11 2018
dskaram@ as you commented on #25, Do you have any update that can be shared with the customer?
,
Apr 12 2018
The change is available client-side but still not surfaced server-side. Due to some delays, we had to punt to Q2. So please expect this by end of this quarter.
,
Jun 21 2018
Are there any updates on the availability of this feature please?
,
Aug 3
Is this feature available as of August 2018? If so please indicate where it is configured. Thanks.
,
Aug 20
,
Aug 30
Cheers everyone, I have a technical case open (16780036) requesting an update on this matter and public facing documentation on how to perform the procedure in his devices. What's the feedback we have to provide in this matter?
,
Aug 30
Technical work on this is completed. Please reach out to marcuskoehler@ if you need additional information/public-facing docs and he can help coordinate that effort.
,
Aug 30
Any there any instructions on where this is configured / rollout schedule please?
,
Sep 3
The following revision refers to this bug: https://chromium.googlesource.com/chromium/src.git/+/85203f2094a0673955fcef4716a79bec4a604e9c commit 85203f2094a0673955fcef4716a79bec4a604e9c Author: Denis Kuznetsov <antrim@google.com> Date: Mon Sep 03 14:24:11 2018 Make policy description public Bug: 676195 Change-Id: I75ba73a7ee75d446c8d5b79d8f4c45aed569940d Reviewed-on: https://chromium-review.googlesource.com/1201855 Reviewed-by: Sergey Poromov <poromov@chromium.org> Commit-Queue: Denis Kuznetsov <antrim@chromium.org> Cr-Commit-Position: refs/heads/master@{#588388} [modify] https://crrev.com/85203f2094a0673955fcef4716a79bec4a604e9c/components/policy/resources/policy_templates.json
,
Oct 26
Issue 593574 has been merged into this issue.
,
Jan 17
(6 days ago)
Hello everyone, hello antrim@chromium.org is there any update to this issue? If I understood the conversation correctly, in the end only the update for the admin console is missing, right? We need this to get a valid DHCP-Hostname. Please give us a schedule for the update of the admin console. We would be infinitely grateful!
,
Jan 17
(6 days ago)
Yes, all pieces are there except for admin console changes. I've asked people from Admin Console team to look on this issue.
,
Jan 18
(5 days ago)
Please get this online! I manage a school with thousands of chromebooks, and it's crazy not to be able to see which is which in DHCP/DNS!
,
Jan 18
(5 days ago)
I gave up on this long ago, but would love to see this finally implemented. Please push this through, seems like such a standard and simple thing. Thanks.
,
Yesterday
(37 hours ago)
Any word on this? We also manage 20K plus Chromebooks. Having a name to resolve would help tremendously. |
|||||||||
►
Sign in to add a comment |
|||||||||
Comment 1 by atwilson@chromium.org
, Dec 27 2016Owner: dskaram@chromium.org