-
Notifications
You must be signed in to change notification settings - Fork 118
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Zebra should try harder to discover and distribute good peer addresses #1892
Closed
3 of 7 tasks
Tracked by
#3247
Labels
A-rust
Area: Updates to Rust code
C-security
Category: Security issues
I-hang
A Zebra component stops responding to requests
I-invalid-data
Zebra relies on invalid or untrusted data, or sends invalid data
I-slow
Problems with performance or responsiveness
I-usability
Zebra is hard to understand or use
Comments
4 tasks
This was referenced Mar 28, 2021
2 tasks
Adding this to current sprint (9) as it seems we are working on it |
1 task
18 tasks
The current performance is good enough, we can open specific tickets if we need to. |
36 tasks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
A-rust
Area: Updates to Rust code
C-security
Category: Security issues
I-hang
A Zebra component stops responding to requests
I-invalid-data
Zebra relies on invalid or untrusted data, or sends invalid data
I-slow
Problems with performance or responsiveness
I-usability
Zebra is hard to understand or use
Is your feature request related to a problem? Please describe.
Sometimes Zebra runs out of peer addresses, and stops working.
Describe the solution you'd like
Zebra should advertise its own inbound listener address:
Addr
messagesZebra should regularly try to get new addresses:
Zebra currently uses gossiped outbound peer addresses, and detected inbound peer addresses. We could also add the
address_from
in receivedVersion
messages to our address book, but that could result in multiple connections to a single peer. To avoid these duplicate connections, we try new gossiped addresses before new canonical addresses (#2123).The text was updated successfully, but these errors were encountered: