summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authoralicexbt <alicexbt@protonmail.com>2022-10-19 03:17:51 +0000
committerbitcoindev <bitcoindev@gnusha.org>2022-10-19 03:18:07 +0000
commit27097fb7c5dd7eb8d3c36393c9d44e26699fa887 (patch)
tree2fc2c485ee0206207e42b7470b2d2d48d39b0471
parent69e9ebfcb285e293f6ea7e67376f139e97f184a1 (diff)
downloadpi-bitcoindev-27097fb7c5dd7eb8d3c36393c9d44e26699fa887.tar.gz
pi-bitcoindev-27097fb7c5dd7eb8d3c36393c9d44e26699fa887.zip
Re: [bitcoin-dev] [Opt-in full-RBF] Zero-conf apps in immediate danger
-rw-r--r--59/bc94971914dee69584f4ac82407dd6a86ac544351
1 files changed, 351 insertions, 0 deletions
diff --git a/59/bc94971914dee69584f4ac82407dd6a86ac544 b/59/bc94971914dee69584f4ac82407dd6a86ac544
new file mode 100644
index 000000000..ac80b34eb
--- /dev/null
+++ b/59/bc94971914dee69584f4ac82407dd6a86ac544
@@ -0,0 +1,351 @@
+Return-Path: <alicexbt@protonmail.com>
+Received: from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133])
+ by lists.linuxfoundation.org (Postfix) with ESMTP id D38A5C002D
+ for <bitcoin-dev@lists.linuxfoundation.org>;
+ Wed, 19 Oct 2022 03:18:07 +0000 (UTC)
+Received: from localhost (localhost [127.0.0.1])
+ by smtp2.osuosl.org (Postfix) with ESMTP id 9E48F409FC
+ for <bitcoin-dev@lists.linuxfoundation.org>;
+ Wed, 19 Oct 2022 03:18:07 +0000 (UTC)
+DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 9E48F409FC
+Authentication-Results: smtp2.osuosl.org;
+ dkim=pass (2048-bit key) header.d=protonmail.com header.i=@protonmail.com
+ header.a=rsa-sha256 header.s=protonmail3 header.b=OU7qpT9K
+X-Virus-Scanned: amavisd-new at osuosl.org
+X-Spam-Flag: NO
+X-Spam-Score: -2.101
+X-Spam-Level:
+X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5
+ tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
+ DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001,
+ SPF_HELO_PASS=-0.001, SPF_PASS=-0.001]
+ autolearn=ham autolearn_force=no
+Received: from smtp2.osuosl.org ([127.0.0.1])
+ by localhost (smtp2.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)
+ with ESMTP id X7LNKoWTpXcV
+ for <bitcoin-dev@lists.linuxfoundation.org>;
+ Wed, 19 Oct 2022 03:18:05 +0000 (UTC)
+X-Greylist: domain auto-whitelisted by SQLgrey-1.8.0
+DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 128DB40111
+Received: from mail-40140.protonmail.ch (mail-40140.protonmail.ch
+ [185.70.40.140])
+ by smtp2.osuosl.org (Postfix) with ESMTPS id 128DB40111
+ for <bitcoin-dev@lists.linuxfoundation.org>;
+ Wed, 19 Oct 2022 03:18:04 +0000 (UTC)
+Date: Wed, 19 Oct 2022 03:17:51 +0000
+DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
+ s=protonmail3; t=1666149482; x=1666408682;
+ bh=UbpBuSxMkBbKLDroY9+e1EWJwoih1uQQqxqZIGdsHfI=;
+ h=Date:To:From:Cc:Subject:Message-ID:In-Reply-To:References:
+ Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID:
+ Message-ID;
+ b=OU7qpT9K8RHcyYxNO1nP/08CZbhp5M4nJDU02OBIJzBTo2GCaxtWDnowv3JOGPLAN
+ oEs1MXw9TU3FTkIzarpo3SAuFpJLXR8N1UAMMmsOxBpFFGt/KrSaKvYl09BcSOJEXr
+ dReWMGp9HNm701MNg2pFTPGu0hnVBf5eVIa5z6tV7w9LcX4sZ+VjkPUmY09gsqczYc
+ 41ifkyU+8Zjj577Ry4y2HSiNqWHM5/HB5yDq1upFl0NqQFXrgbcbAilQciB9i+QOYn
+ vdfVbue3RgBHZo1G52b3x5/bi4uQ1f0A2m6ht34s1gzyyt4yPHrZEcXX2FTtWrzqYE
+ ZmN7l53d/ONOA==
+To: Anthony Towns <aj@erisian.com.au>
+From: alicexbt <alicexbt@protonmail.com>
+Message-ID: <PC-7ALULc67cy0mTKzk_uj-pbCcwDoMuJQmmevzLPexK32B11vuzCusGSrx1wNCQ5YtMqfQeI1N5AmdemvfHEJNJ5VmZxAeaWS6E3tNZxIs=@protonmail.com>
+In-Reply-To: <Y05PHYtrNmA0vg7U@erisian.com.au>
+References: <Y0ZTtlRSBihNN9+v@erisian.com.au>
+ <0hpdGx-1WbZdG31xaMXGHKTCjJ2-0eB5aIXUdsp3bqI1MlCx6TMZWROwpl1TVI5irrBqRN2-ydM6hmf3M5L-7ZQfazbx66oameiWTHayr6w=@wuille.net>
+ <Y0d/e2sEoNRgD7KP@erisian.com.au> <Y0u8Ee2Ao375z8UD@erisian.com.au>
+ <CALZpt+GSYBFxajSyZS19sQi4_6zHjkA5sP00V-pR=_NEVVUnkg@mail.gmail.com>
+ <Y05PHYtrNmA0vg7U@erisian.com.au>
+Feedback-ID: 40602938:user:proton
+MIME-Version: 1.0
+Content-Type: text/plain; charset=utf-8
+Content-Transfer-Encoding: quoted-printable
+X-Mailman-Approved-At: Wed, 19 Oct 2022 11:31:59 +0000
+Cc: Bitcoin Protocol Discussion <bitcoin-dev@lists.linuxfoundation.org>
+Subject: Re: [bitcoin-dev] [Opt-in full-RBF] Zero-conf apps in immediate
+ danger
+X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
+X-Mailman-Version: 2.1.15
+Precedence: list
+List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
+List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>,
+ <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
+List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
+List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
+List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
+List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>,
+ <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
+X-List-Received-Date: Wed, 19 Oct 2022 03:18:07 -0000
+
+Hi aj,
+
+> I mean, I guess I can understand wanting to reduce that responsibility
+> for maintainers of the github repo, even if for no other reason than to
+> avoid frivolous lawsuits, but where do you expect people to find better
+> advice about what things are a good/bad idea if core devs as a whole
+> are avoiding that responsibility?
+
+Bitcoin Core contributors and maintainers should provide the options, recom=
+mendations etc. about mempool policies. If these policies are kept for user=
+s to change based on their needs, why force anything or change defaults ign=
+oring feedback?
+
+> Core devs are supposedly top technical experts at bitcoin -- which means
+> they're the ones that should have the best understanding of all the
+> implications of policy changes like this.
+
+Why even provide options for users to change RBF policy in that case? Optio=
+n to disable was already [removed][1] ignoring NACKs and MarcoFalke prefers=
+ users try the [workaround][2] if there is ever a need to disable it. Are w=
+e going to remove all the options to switch RBF policies in future because =
+fullrbf has been suggested by leading technical experts? Is there a possibi=
+lity of experts going wrong and has it ever happened in past?
+
+> It's a bit disappointing that the people that's a problem for didn't
+> engage earlier -- though looking back, I guess there wasn't all that
+> much effort made to reach out, either.
+
+To be fair, John Carvalho did [comment][3] about this in a pull request alt=
+hough it was wrong PR and never going to be merged.
+
+> And I mean: all this is only about drawing a line in sand; if people
+> think core devs are wrong, they can still let that line blow away in
+> the wind, by running different software, configuring core differently,
+> patching core, or whatever else.
+
+I think this is the best option for users at this point. Keep running older=
+ versions of Core and use Knots or other implementations until technical ex=
+perts in core repository, other bitcoin projects and users are on the same =
+page.
+
+> And the
+> impression I got from the PR review club discussion more seemed like
+> devs making assumptions about businesses rather than having talked to
+> them (eg "[I] think there are fewer and fewer businesses who absolutely
+> cannot survive without relying on zeroconf. Or at least hope so").
+
+Even I noticed this since I don't recall the developers of the 3 main coinj=
+oin implementations that are claimed to be impacted by opt-in RBF making an=
+y remarks.
+
+[1]: https://github.com/bitcoin/bitcoin/pull/16171
+[2]: https://github.com/bitcoin/bitcoin/pull/25373#issuecomment-1157846575
+[3]: https://github.com/bitcoin/bitcoin/pull/25373#issuecomment-1163422654
+
+/dev/fd0
+
+Sent with Proton Mail secure email.
+
+------- Original Message -------
+On Tuesday, October 18th, 2022 at 12:30 PM, Anthony Towns via bitcoin-dev <=
+bitcoin-dev@lists.linuxfoundation.org> wrote:
+
+
+> On Mon, Oct 17, 2022 at 05:41:48PM -0400, Antoine Riard via bitcoin-dev w=
+rote:
+>=20
+> > > 1) Continue supporting and encouraging accepting unconfirmed "on-chai=
+n"
+> > > payments indefinitely
+> > > 2) Draw a line in the sand now, but give people who are currently
+> > > accepting unconfirmed txs time to update their software and business
+> > > model
+> > > 3) Encourage mainnet miners and relay nodes to support unconditional
+> > > RBF immediately, no matter how much that increases the risk to
+> > > existing businesses that are still accepting unconfirmed txs
+> > > To give more context, the initial approach of enabling full RBF throu=
+gh
+> > > #25353 + #25600 wasn't making the assumption the enablement itself wo=
+uld
+> > > reach agreement of the economic majority or unanimity.
+>=20
+>=20
+> Full RBF doesn't need a majority or unanimity to have an impact; it needs
+> adoption by perhaps 10% of hashrate (so a low fee tx at the bottom of
+> a 10MvB mempool can be replaced before being mined naturally), and some
+> way of finding a working path to relay txs to that hashrate.
+>=20
+> Having a majority of nodes/hashrate support it makes the upsides better,
+> but doesn't change the downsides to the people who are relying on it
+> not being available.
+>=20
+> > Without denying that such equilibrium would be unstable, it was designe=
+d to
+> > remove the responsibility of the Core project itself to "draw a hard li=
+ne"
+> > on the subject.
+>=20
+>=20
+> Removing responsibility from core developers seems like it's very much
+> optimising for the wrong thing to me.
+>=20
+> I mean, I guess I can understand wanting to reduce that responsibility
+> for maintainers of the github repo, even if for no other reason than to
+> avoid frivolous lawsuits, but where do you expect people to find better
+> advice about what things are a good/bad idea if core devs as a whole
+> are avoiding that responsibility?
+>=20
+> Core devs are supposedly top technical experts at bitcoin -- which means
+> they're the ones that should have the best understanding of all the
+> implications of policy changes like this. Is opt-in RBF only fine? If
+> you look at the network today, it sure seems like it; it takes a pretty
+> good technical understanding to figure out what problems it has, and
+> an even better one to figure out whether those problems can be solved
+> while keeping an opt-in RBF regime, or if full RBF is needed.
+>=20
+> At that point, the technical experts should be coming up with a
+> specific recommendation, and, personally, I think that's exactly what
+> happened with [0] [1] and [2].
+>=20
+> [0] https://lists.linuxfoundation.org/pipermail/lightning-dev/2021-May/00=
+3033.html
+> [1] https://github.com/bitcoin/bitcoin/pull/25353
+> [2] https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-June/020=
+557.html
+>=20
+> That did draw hard line in the sand: it said "hey, opt-in RBF had a good
+> run, but it's time to switch over to full RBF, for these reasons".
+>=20
+> It's a bit disappointing that the people that's a problem for didn't
+> engage earlier -- though looking back, I guess there wasn't all that
+> much effort made to reach out, either. There were two mentions in the
+> optech newsletter [3] [4] but it wasn't called out as an "action item"
+> (maybe those aren't a thing anymore), so it may have been pretty missable=
+,
+> especially given RBF has been discussed on and off for so long. And the
+> impression I got from the PR review club discussion more seemed like
+> devs making assumptions about businesses rather than having talked to
+> them (eg "[I] think there are fewer and fewer businesses who absolutely
+> cannot survive without relying on zeroconf. Or at least hope so").
+>=20
+> [3] https://bitcoinops.org/en/newsletters/2022/06/22/
+> [4] https://bitcoinops.org/en/newsletters/2022/07/13/
+>=20
+> If we're happy to not get feedback until we start doing rcs, that's fine;
+> but if we want to say "oops, we're into release candidates, you should
+> have something earlier, it's too late now", that's a pretty closed-off
+> way of doing things.
+>=20
+> And I mean: all this is only about drawing a line in sand; if people
+> think core devs are wrong, they can still let that line blow away in
+> the wind, by running different software, configuring core differently,
+> patching core, or whatever else.
+>=20
+> > Moreover, relying on node operators turning on the setting
+> > provides a smoother approach offering time to zero-conf services to rea=
+ct
+> > in consequence.
+>=20
+>=20
+> I don't think that's remotely true: take a look at taproot activation:
+> it took two months between releasing code that supported signalling and
+> having 98% of hashrate signalling; with 40% of blocks signalling within
+> the first two weeks.
+>=20
+> > So the current path definitely belongs more to a 3) approach.
+>=20
+> > > 3) Encourage mainnet miners and relay nodes to support unconditional
+> > > RBF immediately, no matter how much that increases the risk to
+> > > existing businesses that are still accepting unconfirmed txs
+>=20
+>=20
+> Yes, that's how it appears to me, too. It's not my preference (giving
+> people clear warning of changes seems much better to me), but I can
+> certainly live with it.
+>=20
+> But if the line in the sand is "we're doing this, no matter how much that
+> increases the risk to existing businesses that weren't expecting it" then
+> it seems very disingenuous not to make those risks very clear so that
+> people who weren't expecting it actually take action to avoid those risks=
+.
+>=20
+> That is, it seems to me that Dario was exactly right in titling this
+> thread "Zero-conf apps in immediate danger", and our co-developers who
+> are dismissing the risk by saying things along the lines of "probably
+> nothing will change anytime soon" are exactly wrong.
+>=20
+> (More generally, that's similar to one of the things I've hated
+> watching in mainstream economics over the past few years: "doing this
+> will cause massive inflation" "no it won't, there's no inflation risk"
+> "oops, inflation magically appeared, how did that happen? oh well, too
+> bad, we have to live with it now". This looks pretty similar to me: "do
+> something risky, deny the risk, make sure nobody can hold us accountable
+> when the risk eventuates later" so it makes me really uncomfortable)
+>=20
+> > While this
+> > way cannot be denied to be a zero-risk deployment for business acceptin=
+g
+> > unconfirmed transactions, it should be weighed in face of multi-party
+> > contracting protocols encumbering an annoying pinning vector.
+>=20
+>=20
+> Sure; that's a fine reason to draw the line in the sand. But it's not
+> a good reason to have it happen immediately, rather than giving people
+> time to react, and it's not a good reason to understate the risk of
+> it happening now. Maybe there are good reasons for either or both of
+> those, though?
+>=20
+> > Since Dario's mail, I think we have learnt new data points, a) on the l=
+ong
+> > term full RBF to align miner incentives is acknowledged and b) a clear
+> > timeline based on e.g a block height is favored over the pollination
+> > deployment.
+>=20
+>=20
+> Using the passive voice there doesn't seem helpful. Who learnt these
+> things? You, I and Dario all seem to agree with (a), but John Carvalho
+> certainly appears not to, for instance. I'm not sure who agrees with
+> (b) -- I know I do, and I think Dario does; but multiple people seem
+> opposed to the clear timeline offered in #26323, and your #26305 seems
+> more likely to encourage a "pollination" approach rather than discourage
+> it ("oh, this will be the default option for 25.0, might as well enable
+> it now like all the cool kids are").
+>=20
+> For what it's worth, my guess is that releasing core with full rbf
+> support and having you and Murch and others advocating for people to
+> try it out, will mean that full RBF is usable on mainnet within two
+> or three months, supported by perhaps 5%-20% hashpower, but probably
+> still requiring special effort to actually find a peer that can relay
+> full rbf txs to that hashpower (probably doing an addnode, despite the
+> privacy implications). Even if that happens, I'm not super confident
+> that it would mean people would actively steal from zeroconf businesses
+> in any volume, though. It's not something I'd risk happening to me,
+> but accepting zeroconf from strangers isn't something I'd risk anyway.
+>=20
+> Slowing that down from January-ish to May seems like it ought to be a
+> big win for anyone who has been doing zeroconf, and having it be easy
+> to find a path to miners when it is supported seems like a big win even
+> given a cost of a few months delay.
+>=20
+> OTOH, if we're really not expecting full rbf to be available for many
+> months, then I would have expected the "disable this for mainnet,
+> reconsider after the release" PR (#26287) to have gone ahead already.
+>=20
+> > Tie-breaking between
+> > both, I believe I would favor something like #26323 though only post 24=
+.0
+> > to avoid introducing a bikeshedding precedent in terms of release proce=
+ss,
+>=20
+>=20
+> Doing something like #26323 only after 24.0 is out does nothing to
+> mitigate whatever immediate risk there is to bitcoin businesses/users...
+>=20
+> And if the choice is between "bikeshedding" and "merge a PR, then ignore
+> feedback that it's harmful", I'd much rather the bikeshedding. What's
+> the point of having rcs if you're going to ignore negative feedback?
+>=20
+> I mean, if you think the feedback is wrong, that's different: maybe we
+> shouldn't care that zeroconf apps are in immediate danger, and maybe
+> bitcoin would be better if any that don't adapt immediately all die
+> horribly as a lesson to others not to make similarly bad assumptions.
+>=20
+> But saying "we don't want them to be in danger" and also refusing to do
+> anything to avoid it?
+>=20
+> Cheers,
+> aj
+>=20
+> _______________________________________________
+> bitcoin-dev mailing list
+> bitcoin-dev@lists.linuxfoundation.org
+> https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev
+