Voting for a new IC release - 2024-03-06_23-01

Hello there!

We are happy to announce that voting is now open for a new IC release .
The NNS proposal is here: IC NNS Proposal 128295.

Here is a summary of the changes since the last release:

Release Notes:

Change log since git revision 48da85ee6c03e8c15f3e90b21bf9ccae7b753ee6


  • [0b77b6283] Boundary Nodes,Node: enable slicing
  • [0789fa168] Consensus(ecdsa): Return the reference to the quadruple’s key transcript
  • [471422e49] Consensus(ecdsa): Call pre-signer and complaints purger whenever finalized height increased
  • [d6407125a] Message Routing: bump Certification Version to V16
  • [c8bc2ec89] Message Routing,Runtime: write and verify sharded overlays
  • [be0a4bdaf] Runtime: Support Wasm passive data segments


  • [7f562f91d] Execution,Runtime: Adapt upgrade option (skip_pre_uprade) to the IC specification
  • [12b7c603d] Message Routing: rename lsmt_storage to lsmt_status
  • [602022746] Networking: start the old p2p iff it is used
  • [9228ec26e] Networking: retransmission requests should not be running when the new P2P is enabled
  • [ab05f1ff3] Node: Bare Metal Deployment: Fail if all connectivity retries fail
  • [a09fef9f4] Node: IPv4 connectivity check - GuestOS Firewall: Accept established, related incoming connections


  • [083d73831] Boundary Nodes,Node: enabling range requests for custom domains
  • [a57e9a52b] Consensus(ecdsa): Fix active signature requests metric in the improved latency case
  • [7650b5751] Consensus: Remove dependency on ic-artifact-pool from ic-consensus
  • [dcbff431c] Crypto: remove obsolete SKS V1->V2 migration code
  • [40bb795aa] Execution,Runtime: Cleanup noop reject_code() calls
  • [ad5f48e6c] Networking(http_endpoint): Migrate status endpoint to axum
  • [cfbe7c91b] Networking: Temporarily disable /threads endpoint
  • [773db94a2] Node: Increase file descriptor limit
  • [de62b50bb] Runtime(RUN): Remove WasmInstrumentationError::InvalidExport


  • [d0bb3bb0a] Crypto: Refactor internal tecdsa crypto lib crate


  • [51e7c5188] Consensus: move some test-only code to test libraries
  • [b2077d203] Crypto: simplify local vault IDKG test
  • [5d107f3c6] Crypto: improve test coverage in crypto component’s IDKG
  • [140dc66bb] Crypto: improve test coverage of crypto code in types
  • [546606f21] Execution,Runtime: reduce the number of proptest cases for canister logging
  • [4d692ad70] Execution,Runtime: reduce the number of proptest cases for canister logging
  • [c27536bc4] Message Routing: Clean up ic_canonical_state tests
  • [197873b04] Message Routing: replace tiny_http with axum in xnet_client_tests

Other changes:

  • [6bfc3729e] Boundary Nodes,T&V,Node: Move anyhow dependencies to workspace
  • [bd3d67539] Consensus: Filter out IPv4 loopback address in HostOS console logging
  • [8c3071d6a] Consensus,T&V,IDX(tests): Wait until mr_registry_version has the correct value
  • [2646a692e] Execution,Runtime,Consensus: remove synchronous QueryHandler trait
  • [14fcdf9f2] IDX,T&V,Consensus(ecdsa): Allow multiple signing subnets for the same key
  • [598c1b304] Networking: Expose API Boundary Nodes in http endpoints
  • [ccaefadb4] Node: Updating container base images refs [2024-02-29-0815]

Link to the forum post: Voting for a new IC release - 2024-03-06_23-01

IC-OS Verification

To build and verify the IC-OS disk image, run:

# From
sudo apt-get install -y curl && curl --proto '=https' --tlsv1.2 -sSLO && chmod +x && ./ -c 778d2bb870f858952ca9fbe69324f9864e3cf5e7

The two SHA256 sums printed above from a) the downloaded CDN image and b) the locally built image, must be identical, and must match the SHA256 from the payload of the NNS proposal.


And there is another build which enables p2p for consensus:

GitHub link: GitHub - dfinity/ic at release-2024-03-06_23-01+p2p

Thanks in advance for checking out the changes, commenting, and hopefully approving the rollout!


Reviewers for the CodeGov project have completed our review of these replica updates.

Proposal ID: 128295
Full report on OpenChat

Proposal ID: 128296
Full report on OpenChat

At the time of this comment on the forum there are still 2 days left in the voting period, which means there is still plenty of time for others to review the proposal and vote independently.

We had several very good reviews of the Release Notes on these proposals by @Zane, @cyberowl, @ZackDS, @massimoalbarello, @ilbert, @Gekctek, and @hpeebles. The IC-OS Verification was also performed by @jwiegley and @tiago89. I recommend folks talk a look and see the excellent work that was performed on these reviews by the entire CodeGov team. Feel free to comment here or in the thread of each respective proposal in our community on OpenChat if you have any questions or suggestions about these reviews.