-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ConnectionOpenTry
: double-check check_client_consensus_height
impl
#167
Comments
Additionally, note that we also check the lower bound in Maybe this check is redundant with the consensus state proof verification? i.e. if the host doesn't have the consensus state stored at that height, then the consensus state proof verification will fail. |
Copying the TLDR; from Anca's comment on cosmos/ibc-go#1732 ->
I wonder if the new ADR05 validation/execution separation can help solve this problem. |
I think this is correct and we could remove the redundant check for |
It is closed, as it is obsolete following the implementation of ADR05 and PR #257 |
We changed where the height check is (now here for |
oh, Thanks for the update 👍🏻 |
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.2.0 to 0.12.0. - [Commits](golang/crypto@v0.2.0...v0.12.0) --- updated-dependencies: - dependency-name: golang.org/x/crypto dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by: dependabot[bot] <[email protected]> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by: Carlos Rodriguez <[email protected]>
Specifically this line. Our check is:
whereas ibc-go does
That is,
>
vs>=
. However, we shouldn't necessarily blindly change it to>=
. See this discussion for the subtleties involved in this decision.The text was updated successfully, but these errors were encountered: