-
Notifications
You must be signed in to change notification settings - Fork 146
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Downtime slash acknowledgements never sent to consumer if validator tombstoned #237
Comments
Do you have any thoughts on this @sainoe? |
The consumer module keeps track of the The Therefore the acknowledgement is meant to inform a consumer chain that it has successfully slashed a validator for downtime on the provider chain. |
I understand the outstanding downtime part, but do we definitely want this to mean that the validator was not slashed, or simply that the slash packet was not received? Because if the validator is tombstoned, the ack will never arrive, even though the slash request did arrive. Maybe this is OK. |
It means not slashed yet.
For the tombstoning there isn't the issue of sending the same infraction twice and anyway validators can't be slashed for double-sign multiple time. AFAIU if the slash packet is never received the ordered channel will |
Ok it sounds good. Thanks. |
In the code if the validator is tombstoned the downtime slash acknowledgement is never sent. The question, is what is intended by the acknowledgement? If the ack is supposed to mean that the slash happened then the code is correct. If the ack is supposed to mean that the slash request was received then the code is wrong. Either way there is a divergence from the spec but this is already covered by these issues
interchain-security/x/ccv/provider/keeper/relay.go
Lines 232 to 249 in e265d43
The text was updated successfully, but these errors were encountered: