Policy-set 'Do not Check' Server Certificate checking option ignored for EAP networks |
||||||
Issue descriptionOriginally reported by allanrobert@ in https://bugs.chromium.org/p/chromium/issues/detail?id=882641#c34 Original report: Hi, [..] I have received the follow case from one of our Enterprise customers, They have tried the behavior in M70 but this does not work for them. Did we miss something? unify# 17425739 |======Product Information======| - Affected domain: ** Working environment ** - Chrome OS version. 69 and 70.0.3538.76 - Domain managed devices? yes |======Issue Definition======| - Issue description: Chrome devices will change the value of Server CA certificate during enrollment. - Steps to reproduce 1) Wipe the device 2) Enroll the Chromebook 3) The device will disconnect during the enrollment process 4) The user connects manually to the network, the value is set to "Default" even when they have configured "Do not check" in the Admin Console - Timeframe when issue started: Since version 69 - Does it affect all devices? The issue can be reproduced in all his devices - Existing Workaround: Connect manually |======Consult Files & Notes ======| -Json file of policies -Debug logs Nov 5, 2018 Issue reproduced at 3:50-3:52 PM Pacific time https://drive.google.com/open?id=1uWl__YQXXuuWRiASPiHljJjTFiKT4Qra Thank you for your help!
,
Nov 6
So the linked policy has:
(*) a DeviceOpenNetworkConfiguration device-wide policy with
a certificate {760c58f7-0e68-4a23-94f7-e28068f8e513}
an auto-connect EAP-PEAP wifi with
UseSystemCAs: true
ServerCARef: {760c58f7-0e68-4a23-94f7-e28068f8e513}
(*) a OpenNetworkConfiguration user policy with
the same certificate as above
an auto-connect EAP-PEAP wifi with
UseSystemCAs: false
no ServerCARef
Weirdly, the shill network config in effect when the feedback was filed (with profile Profile: /profile/chronos/shill
) seems to have EAP.UseSystemCAs: false and an EAP.CACertPEM/0 field, which is a combination not given above.
I'll try to repro this locally.
,
Nov 6
Could you please ask the customer to show a screenshot of their network configuraiton in admin.google.com? Do they have networks configured "by device" and "by user"? Also, do they want the "Do not check" setting to be effective in both the device-wide and the per-user network?
,
Nov 12
Customer answers: >Did this start recently or really already in M-69? I'm asking because M-69 has been out for a while. They've found this issue in v69. >Could you please ask the customer to show a screenshot of their network configuraiton in admin.google.com? Do they have networks configured "by device" and "by user"? Network is configured by device. Screenshots - https://drive.google.com/open?id=16kwXdlh1lDlwBG6RJVYPEck0_4uACYDI https://drive.google.com/open?id=1AC7o-2Qa4EkR_7UL4CDdcOezbaK4qs_9 >Also, do they want the "Do not check" setting to be effective in both the device-wide and the per-user network? They want it to be active device-wide. They also provided video - https://drive.google.com/open?id=11xpmdF0YXvxbKpEbt__IV402KNJ9XhAY
,
Jan 11
Hello! This bug is receiving this notice because there has been no acknowledgment of its existence in quite a bit of time. - If you are currently working on this bug, please provide an update. - If you are currently affected by this bug, please update with your current symptoms and relevant logs. If there has been no updates provided by EOD Thursday, 01/17/19 (5pm EST), this bug will be archived and can be re-opened at any time deemed necessary. Thank you!
,
Jan 11
This bug is still going on and I have been awaiting response from Google for repairing this. Has there ever been resolution to this issue?
,
Jan 11
Just to confirm, are you still able to reproduce this issue? NOTE: If you are replying on behalf of an Enterprise Domain, please provide an update from that domain so we can continue to monitor the impact of this issue.
,
Jan 11
This issue has an owner, a component and a priority, but is still listed as untriaged or unconfirmed. By definition, this bug is triaged. Changing status to "assigned". Please reach out to me if you disagree with how I've done this.
,
Jan 17
(6 days ago)
Sorry, I was out for a few months. I will take a closer look at this issue.
,
Jan 17
(6 days ago)
I think the client behaves correctly as configured according to the policy json in the issue description. Background: (*) UseSystemCAs=true is set for the wifi in the policy (*) A ServerCARef is set for the wifi in policy. However, the policy json does not match what is shown in the screenshot in Comment #4. Are you sure that this network is configured in the admin console for the correct Organization Unit? If yes, I will open a bug with the admin console so they can investigate.
,
Jan 17
(5 days ago)
That is incorrect then cause in our console, we have it configured at the top level domain (on a device wide policy) set to "Do not check the server certificate" as shown in the image I attached.
,
Yesterday
(43 hours ago)
I have forwarded this to the admin console team and will report back as soon as I have an update. |
||||||
►
Sign in to add a comment |
||||||
Comment 1 by pmarko@chromium.org
, Nov 6