Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for cryptographic equivocation to support ICS in Gaia v14 #1348

Open
mmulji-ic opened this issue Nov 29, 2023 · 5 comments
Open
Assignees

Comments

@mmulji-ic
Copy link

Gaia v14 introduces an updated ICS provider, which can handle slashing for misbehaving clients in an automated fashion. Therefore Hub governance proposals such as prop 818 are no longer required.

Adding this support, to be able to report misbehaviour, would bring the Go relayer in line with Hermes release 1.7.3, which supports this functionality.

@jtieri
Copy link
Member

jtieri commented Feb 2, 2024

Hey @mmulji-ic, getting back to this a little late since it was not in scope of our recent release.

I'd like to begin scoping this work, but to do so I need to learn a bit more about what supporting this feature entails. Is there somewhere that I can read a spec on cryptographic equivocation?

@sainoe
Copy link

sainoe commented Feb 7, 2024

Hi @jtieri. You can find the cryptographic equivocation ADR here.

@jtieri
Copy link
Member

jtieri commented Feb 8, 2024

Hi @jtieri. You can find the cryptographic equivocation ADR here.

thanks! i'm out of the office for the next week but will begin to dig through the ADR asap

@jonathanpberger
Copy link

Blocked until ICS updates deps.

IDEA: could we downgrade in the relayer for now? Show it works and then build suite after. Then wait on merging until new ICS is ready.

@jonathanpberger
Copy link

Tried downgrading the relayer, but it was more trouble than it's worth. Iceboxing story.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants