-
Łukasz Nowak authored
Instead of dropping some keys (easy to implement, impossible to test and easy to leak) create whitelist of passed keys of slaves to the nodes. Then if there are new keys in slave's connection parameters the nodes are protected against being polluted with them.
94604880