-
Notifications
You must be signed in to change notification settings - Fork 206
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fraud proof communication #88
Comments
The design I initially proposed was 3) where mev-boost can call Why I think 3) can work:
The fraud proof does assume that the execution client provides an RPC for simulating a block on top of the state of any of the past 64 blocks. Initially, the plan was to use ValidationsequenceDiagram
Title: Fraud Proof
participant mev_boost
participant relays
mev_boost->>relays: relay_getRelayStatusV1
Note over mev_boost: blacklist bad relay
relay_getRelayStatusV1Request
Response
RelayStatus
FraudProof
|
What is the current direction this is headed? I'm not sure how bad payloads are supposed to be communicated between
mev-boost
nodes and I think this is important in order to know ahead of time which relays to avoid using.The options I can think of are:
mev-boost
implements p2p - also seems unlikely pre-merge, but maybe with re-use of Prysm's libraries this wouldn't actually be too badmev-boost
nodes that other relays are misbehaving. This one seems least appealing but maybe the easiest to actually implement pre-merge. Relevant comment: Simplify spec, update based on recent discussions #82 (comment)The text was updated successfully, but these errors were encountered: