`rogue` peers on mainnet

Hi, Validators,

We have identified some rogue peers sending out consensus messages signed with non-active blskeys on harmony mainnet.
Those nodes will be blocked in the network later once we implemented the block list feature as described here (Nodes sending invalid p2p messages to the network)
It maybe you are still running legacy version of node program prior to v2.1.9.
For now, please do a self check on your node or backup node, and taking them offline if they are in the rogue peer list.

how to check peerid of the node

install jq if you don’t it already

https://stedolan.github.io/jq/download/

check peerid on node

curl -s --request POST 'http://127.0.0.1:9500/' --header 'Content-Type: application/json' --data-raw '{ "jsonrpc": "2.0", "method": "hmyv2_getNodeMetadata", "params": [], "id": 1}' | jq .result.peerid

how to fix the node

upgrade to latest version

Please upgrade to the latest release of v2.2.0 (Release Mainnet Release v2.2.0 · harmony-one/harmony · GitHub).
The new release will not sign/send out consensus messages if the blskey is not active in the current committee.

or remove rogue blskeys not in the current committee

check .hmy/blskeys

check node version

You may check your node version by running the following command in the console.
./node.sh -V

list of rogue peers

Shard0

  • QmbnAEajvZ9LD6fXSEBSbHfSEdEaCdW4ZurqgXjVFtXfiv
  • QmQyvhNnWZhdUxPBaFLX6is9tyUmwU9HCF72D5voTyk4L1

Shard1

  • QmaL1UJKmYCWjofXZAnj3v9wHME6pp2AxBqmVMnwYFyD2z
  • QmbhzzZfrvGEYGbJb4J5PEH49U1Rij5AKwxwbE7jdHaXsA
  • QmbkUogCRth6ZU5pQix3T2sqgqs41LFK6SnmeEUE7mSLMS
  • QmedFVmsiv7c7yEqhyRpT8Q9XSH5DmxKFWBV3Qc3CvJQrX
  • QmPBKJyk5XfkTPNPDq14GYapYjPg1SX4Qd6L2qhhSxhQhG
  • QmPcSauz9muL7tjPbD7qLYBYBppSSa5nyp3qHjoNKQMKDt
  • QmPCxfdjRCMESrsR497c1Y4mf4eHaTd74EBGRum8Zy6XWN
  • QmPQvv2VU56FPMaUBpNdqfXbsmXJnTUUDvkGBBAJipMYe9
  • QmR8Uehk9G518ZAycVn8BHTS7YSnwVnSS4KdWwfwF1kyW9
  • QmYtmRGC6K17nYrdj57qAu5BSuMs6wsALTjbi7CbLNx7SN
  • QmZYL4bFrjqDjx43e3WsGzCxiQnDom3XkxsXkDPfp154GL

Shard2

  • QmcX6BYPeoy2g6XaPZSaajjwDZuubWDktg9bgpzi8A3ae8
  • QmR8Uehk9G518ZAycVn8BHTS7YSnwVnSS4KdWwfwF1kyW9
  • QmWYwrrFxx3aps4RdUUiFpbfwfVU4we7zyABLZBcoP6N5G
  • QmX5BWmgb4PHtWgFg3K5MjG2jKXX6tqePq1QFiwS2Ni9aq

Shard3

  • QmT8PGPQx9KwpgaqAfsNXXCH1gRU5SaAtGYTfYFFS9uhsD
  • QmUApSb3eJ6aJah5vbDsjdRo8iX8MRVTHoKfZGQ1XHk6JR
  • QmXR5YoUuNmXVsHVrLcBsQFGRnKk8HbCsBSVto1Tn6B4uE

rogue peer list update 07/27

shard0

  • Qmc5ZTfuX543JFhG75DSRnxJdW9q53ujBgAhWx2octPtif
  • QmcrcWK9jXRmkM19dxMABJymB5BTVz1PsZoBhEmqH6aERK
  • Qmdka4okSgni8svet3fnL9zdVS5HJCemKpmc9UZkFwZveA
  • QmNnrnabwUY2UUQG3rHqYtkj8Z48s8GzEVBxhHiTpd8BWd
  • QmQyvhNnWZhdUxPBaFLX6is9tyUmwU9HCF72D5voTyk4L1
  • QmXyuTdgXwp6KEv3o6kAswbwUs5LewXNbhtK1hyS6TpFUv

shard1

  • QmaL1UJKmYCWjofXZAnj3v9wHME6pp2AxBqmVMnwYFyD2z
  • QmbhzzZfrvGEYGbJb4J5PEH49U1Rij5AKwxwbE7jdHaXsA
  • QmbkUogCRth6ZU5pQix3T2sqgqs41LFK6SnmeEUE7mSLMS
  • QmedFVmsiv7c7yEqhyRpT8Q9XSH5DmxKFWBV3Qc3CvJQrX
  • QmPBKJyk5XfkTPNPDq14GYapYjPg1SX4Qd6L2qhhSxhQhG
  • QmPcSauz9muL7tjPbD7qLYBYBppSSa5nyp3qHjoNKQMKDt
  • QmPCxfdjRCMESrsR497c1Y4mf4eHaTd74EBGRum8Zy6XWN
  • QmPQvv2VU56FPMaUBpNdqfXbsmXJnTUUDvkGBBAJipMYe9
  • QmYtmRGC6K17nYrdj57qAu5BSuMs6wsALTjbi7CbLNx7SN

shard2

  • QmcX6BYPeoy2g6XaPZSaajjwDZuubWDktg9bgpzi8A3ae8
  • QmSBQLJdSk6jyMpwkBqxNye9KRakz8a5N8jmTRdz58Txz3
  • QmWYwrrFxx3aps4RdUUiFpbfwfVU4we7zyABLZBcoP6N5G

shard3

  • QmXR5YoUuNmXVsHVrLcBsQFGRnKk8HbCsBSVto1Tn6B4uE

rogue peer list update 08/04

shard0
none

shard1
Qmb1jz7JtRoQHRDGKsYLTkzfRmFes5jY6mneEAJ2LnUed1
QmbkUogCRth6ZU5pQix3T2sqgqs41LFK6SnmeEUE7mSLMS
QmPafPkbvEMbZuVBryQzjJLdz48UsSTRYGkEgngdz7VGz3
QmWADGMCeysCkn8BU4EvdxYUn5U3oTEL1SQcSfDd3gt2bC

shard2
Qmauc58UFsQis5gNxa4kPxMXpvdCSp6ajKTkewgc5zJsCe
QmTmXnCdZcBTJdVKWM2ruEPbjHPRwo9kT49yTWhDMMufZ7
QmWYwrrFxx3aps4RdUUiFpbfwfVU4we7zyABLZBcoP6N5G
QmYSu4cb9EwZHXcw9dKe2QodbUxCPtJsC97EppuFgzVTym

shard3
QmXR5YoUuNmXVsHVrLcBsQFGRnKk8HbCsBSVto1Tn6B4uE