Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Tracking] - Standard Slashing Protection Interchange Functionality #7813

Closed
21 tasks done
rauljordan opened this issue Nov 14, 2020 · 0 comments · Fixed by #8024
Closed
21 tasks done

[Tracking] - Standard Slashing Protection Interchange Functionality #7813

rauljordan opened this issue Nov 14, 2020 · 0 comments · Fixed by #8024
Assignees
Labels
Priority: Critical Highest, immediate priority item Tracking Gotta Catch 'Em All
Milestone

Comments

@rauljordan
Copy link
Contributor

rauljordan commented Nov 14, 2020

💎 Issue

Background

The objective of this issue is to define a clear path for Prysm to implement the eth2 client slashing protection interchange format defined by EIP-3076. The EIP now comes with conformity tests which we can ensure our client satisfies. We have written up a design document for this feature here.

v1.0.1 Schema and Foundations

V1.1.0 Runtime Integration

Import and exporting

Integrating invariants at runtime

It’s possible for an interchange file to contain blocks and attestations that
are mutually slashable, i.e. the interchange file contains evidence that the
validator has already committed a slashable offence. It’s also possible for
an interchange to contain messages that are slashable with respect to ones already
in the database. Require implementations to import all validators that are not slashable,
and reject all that are slashable

Refuse to sign any block with slot <= min(b.slot for b in data.signed_blocks if b.pubkey == proposer_pubkey), except if it is a repeat signing as determined by the signing_root. #8067

Refuse to sign any attestation with source epoch less than the minimum source epoch present in that signer’s attestations (as seen in data.signed_attestations)

Testing and docs

@rauljordan rauljordan added Priority: Critical Highest, immediate priority item Tracking Gotta Catch 'Em All labels Nov 14, 2020
@rauljordan rauljordan self-assigned this Nov 14, 2020
@rauljordan rauljordan added this to the Diamond milestone Nov 14, 2020
@rauljordan rauljordan removed this from the Diamond milestone Nov 20, 2020
@rauljordan rauljordan added this to the v1.1.0 milestone Nov 26, 2020
@rauljordan rauljordan modified the milestones: v1.0.4, v1.0.5, v1.1.0 Dec 4, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Priority: Critical Highest, immediate priority item Tracking Gotta Catch 'Em All
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant