Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id 40959E62 for ; Thu, 17 May 2018 21:27:18 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.7.6 Received: from mail-qt0-f178.google.com (mail-qt0-f178.google.com [209.85.216.178]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id 2F06A6CF for ; Thu, 17 May 2018 21:27:17 +0000 (UTC) Received: by mail-qt0-f178.google.com with SMTP id q13-v6so7762368qtp.4 for ; Thu, 17 May 2018 14:27:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=UxQSIuFgpj/R+hKZvfJ+9oiH4zEsct+mAiVfSurRSW8=; b=KqZRCvheo2KCniJDSqNkJ7giq7Ym7kC9ZNx/oOdKVljwe+S6kjUr+HDBDy+tt7E9Im q7rJaPpjQc6pklr3ngen9vSCFVSgIfgd2f0Xa//BWOKCuuHC9xCpiVS0p1a4iFf8dKd8 6RS2uM58QHadJxdjM4y8SaKb68Q+ico3eJMlstwzLZTVvFVVp+3+ZgqnIl83KZ9pPeTW aGAsL7VnO17gjoBw/+iCRrc15QGChz13IrSnIoA4nkn6HTuYY5yyF/zOyVMujnoJovnx HDC6y8Yig7R3sZyT+KKWn/tAwxfJhfpgNTei65Q6wea6lOfvNGDqK8sjFY6wOcwxlUua PjwQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=UxQSIuFgpj/R+hKZvfJ+9oiH4zEsct+mAiVfSurRSW8=; b=Dd63AIeJ7mv61dvT/BgcXGnsY6UbUkLqXY1KyMp1g3hFOAXWgbumktt0nLT/DFBjfC cEzWfkxYWii4nbMldZyrclFoZNJfYgLqLIy8jKWBkx1r75hEBbICUkrZmdq4/Ck6KOJR 0m0dbWm9ziCjMQiKVe3Dyt/Gh1z1WU3j+7TOqeOWf0bf4+nE1+BxNQkClDJTkQ+H/VWl Bf8V2QrfIB9fB4weC5WV42AZxWEAKUYOF1qwcUdhe3y9Exw63wUaekuLQnyH3cvd50GG fmVxwpeHJlsEF0GyDI9oJkIHSMuTC2doz5dIgoDJNSCwfMqAw3oOPqSTX41tt+M+5MbH gsuA== X-Gm-Message-State: ALKqPwe8DqtDQQwvHXteyJMWnyC8ieT9wUNCGLK+E9jJgEyp/IyNCM/h Qm+wSMaMnxVnu0tv24wqMw1dog3+bzJQb0gxSPA= X-Google-Smtp-Source: AB8JxZrTEXsQ07zoqkLOD0+TGiDTRDasH3fzgU42oCM9tpp2v7+tdUzOZYrZPNyuCwX+P0zMz9YDAScu77GafuUkFag= X-Received: by 2002:ac8:31ca:: with SMTP id i10-v6mr6767180qte.166.1526592436127; Thu, 17 May 2018 14:27:16 -0700 (PDT) MIME-Version: 1.0 Received: by 10.200.50.92 with HTTP; Thu, 17 May 2018 14:27:15 -0700 (PDT) In-Reply-To: References: <22d375c7-a032-8691-98dc-0e6ee87a4b08@mattcorallo.com> From: Jim Posen Date: Thu, 17 May 2018 14:27:15 -0700 Message-ID: To: Gregory Maxwell Content-Type: multipart/alternative; boundary="000000000000df4b8e056c6d7fd5" X-Spam-Status: No, score=-2.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FROM,HTML_MESSAGE,RCVD_IN_DNSWL_LOW autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org X-Mailman-Approved-At: Thu, 17 May 2018 21:44:23 +0000 Cc: Bitcoin Protocol Discussion Subject: Re: [bitcoin-dev] BIP 158 Flexibility and Filter Size X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 17 May 2018 21:27:18 -0000 --000000000000df4b8e056c6d7fd5 Content-Type: text/plain; charset="UTF-8" > > It isn't a question of 'some lite clients' -- I am aware of no > implementation of these kinds of measures in any cryptocurrency ever. > Doesn't mean there can't or shouldn't be a first. :-) > The same kind of comparison to the block could have been done with > BIP37 filtering, but no one has implemented that. (similarly, the > whitepaper suggests doing that for all network rules when a > disagreement has been seen, though that isn't practical for all > network rules it could be done for many of them-- but again no > implementation or AFAIK any interest in implementing that) Correct me if I'm wrong, but I don't think it's true that the same could be done for BIP 37. With BIP 37, one would have to download every partial block from every peer to determine if there is a difference between them. With BIP 157, you only download a 32 byte filter header from every peer (because filters are deterministic), and using that commitment can determine whether there's a conflict requiring further interrogation. The difference in overhead makes checking for conflicts with BIP 157 practical, whereas it's not as practical with BIP 37. > Sure, but at what cost? And "additional" while nice doesn't > necessarily translate into a meaningful increase in delivered security > for any particular application. > > I think we might be speaking too generally here. > Sure. The security model that BIP 157 now allows is that a light client with* at least one honest peer serving filters* can get the correct information about the chain. No, this does not prevent against total eclipse attacks, but I think it's a much stronger security guarantee than requiring all peers or even a majority of peers to be honest. In a decentralized network that stores money, I think there's a big difference between those security models. > But in exchange the filters for a given FP rate would be probably > about half the current size (actual measurements would be needed > because the figure depends on much scriptpubkey reuse there is, it > probably could be anywhere between 1/3 and 2/3rd). > This does not seem right. Let's assume txids are removed because they are not relevant to this particular point. The difference as I understand it is whether to include in the filter serialized outpoints for inputs or serialized prev scriptPubkeys for inputs. When hashed these are the same size, and there's an equal number of them (one per input in a block). So the only savings comes from deduping the prev scriptPubkeys with each other and with the scriptPubkeys in the block's outputs. So it comes down entirely to how much address reuse there is on the chain. > Monitoring inputs by scriptPubkey vs input-txid also has a massive > advantage for parallel filtering: You can usually known your pubkeys > well in advance, but if you have to change what you're watching block > N+1 for based on the txids that paid you in N you can't filter them > in parallel. > Yes, I'll grant that this is a benefit of your suggestion. > I think Peter missed Matt's point that you can monitor for a specific > transaction's confirmation by monitoring for any of the outpoints that > transaction contains. Because the txid commits to the outpoints there > shouldn't be any case where the txid is knowable but (an) outpoint is > not. Removal of the txid and monitoring for any one of the outputs > should be a strict reduction in the false positive rate for a given > filter size (the filter will contain strictly fewer elements and the > client will match for the same (or usually, fewer) number). > > I _think_ dropping txids as matt suggests is an obvious win that costs > nothing. Replacing inputs with scripts as I suggested has some > trade-offs. > I may have interpreted this differently. So wallets need a way to know when the transactions they send get confirmed (for obvious usability reasons and so for automatic fee-bumping). One way is to match the spent outpoints against the filter, which I think of as the standard. Another would be to match the txid of the spending transaction against the first, which only works if the transaction is not malleable. Another would be to match the change output script against the first, assuming the wallet does not reuse change addresses and that the spending transaction does in fact have a change output. Now lets say these pieces of data, txids, output scripts, and spent outpoints are in three separate filters that a wallet can download separately or choose not to download. The spent outpoint method is the most reliable and has no caviats. It also allows for theft detection as Peter notes, which is a very nice property indeed. If the wallet uses the txid matching though, the txid filter would be smaller because there are fewer txids per block than inputs. So there could be some bandwidth savings to that approach. The change output watching is probably the nicest in some ways because the client needs the output filter anyway. If the transaction has no change output with a unique script, the client could watch for any of the other outputs on the spending tx, but may get more false positives depending on the degree of address reuse. --000000000000df4b8e056c6d7fd5 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
It isn't a question of 'some lite client= s' -- I am aware of no
implementation of these kinds of measures in any cryptocurrency ever.

Doesn't mean there can't or shouldn&= #39;t be a first. :-)
=C2=A0
= The same kind of comparison to the block could h= ave been done with
BIP37 filtering, but no = one has implemented that. (similarly, the
w= hitepaper suggests doing that for all network rules when a
disagreement has been seen, though that isn't practica= l for all
network rules it could be done fo= r many of them-- but again no
implementatio= n or AFAIK any interest in implementing that)

<= /div>
Correct me if I'm wrong, but I don't think it's true = that the same could be done for BIP 37. With BIP 37, one would have to down= load every partial block from every peer to determine if there is a differe= nce between them. With BIP 157, you only download a 32 byte filter header f= rom every peer (because filters are deterministic), and using that commitme= nt can determine whether there's a conflict requiring further interroga= tion. The difference in overhead makes checking for conflicts with BIP 157 = practical, whereas it's not as practical with BIP 37.
=C2=A0<= /div>
Sure, but at what cost?=C2=A0 =C2=A0And= "additional" while nice doesn't
necessarily translate into a meaningful increase in delivered security
for any particular application.

I think we might be speaking too generally here.

<= /div>
Sure. The security model that BIP 157 now allows is that a light = client with at least one honest peer serving filters can get the cor= rect information about the chain. No, this does not prevent against total e= clipse attacks, but I think it's a much stronger security guarantee tha= n requiring all peers or even a majority of peers to be honest. In a decent= ralized network that stores money, I think there's a big difference bet= ween those security models.
=C2=A0
But in exchange the filters for a given FP rate would be probably
about half the current size (actual measurements would be needed
because the figure depends on much scriptpubkey reuse there is, it
probably could be anywhere between 1/3 and 2/3rd).=C2=A0

This does not seem right. Let's assume txids are remo= ved because they are not relevant to this particular point. The difference = as I understand it is whether to include in the filter serialized outpoints= for inputs or serialized prev scriptPubkeys for inputs. When hashed these = are the same size, and there's an equal number of them (one per input i= n a block). So the only savings comes from deduping the prev scriptPubkeys = with each other and with the scriptPubkeys in the block's outputs. So i= t comes down entirely to how much address reuse there is on the chain.
=C2=A0
Monitoring inputs by scrip= tPubkey vs input-txid also has a massive
advantage for parallel filtering:=C2=A0 You can usually known your pubkeys<= br> well in advance, but if you have to change what you're watching block =C2=A0N+1 for based on the txids that paid you in N you can't filter th= em
in parallel.

Yes, I'll grant that t= his is a benefit of your suggestion.
=C2=A0
I think Peter missed Matt's point that you can monitor f= or a specific
transaction's confirmation by monitoring for any of the outpoints that<= br> transaction contains. Because the txid commits to the outpoints there
shouldn't be any case where the txid is knowable but (an) outpoint is not.=C2=A0 Removal of the txid and monitoring for any one of the outputs should be a strict reduction in the false positive rate for a given
filter size (the filter will contain strictly fewer elements and the
client will match for the same (or usually, fewer) number).

I _think_ dropping txids as matt suggests is an obvious win that costs
nothing.=C2=A0 Replacing inputs with scripts as I suggested has some
trade-offs.

I may have interpre= ted this differently. So wallets need a way to know when the transactions t= hey send get confirmed (for obvious usability reasons and so for automatic = fee-bumping). One way is to match the spent outpoints against the filter, w= hich I think of as the standard. Another would be to match the txid of the = spending transaction against the first, which only works if the transaction= is not malleable. Another would be to match the change output script again= st the first, assuming the wallet does not reuse change addresses and that = the spending transaction does in fact have a change output.

Now lets say these pi= eces of data, txids, output scripts, and spent outpoints are in three separ= ate filters that a wallet can download separately or choose not to download= . The spent outpoint method is the most reliable and has no caviats. It als= o allows for theft detection as Peter notes, which is a very nice property = indeed. If the wallet uses the txid matching though, the txid filter would = be smaller because there are fewer txids per block than inputs. So there co= uld be some bandwidth savings to that approach. The change output watching = is probably the nicest in some ways because the client needs the output fil= ter anyway. If the transaction has no change output with a unique script, t= he client could watch for any of the other outputs on the spending tx, but = may get more false positives depending on the degree of address reuse.
--000000000000df4b8e056c6d7fd5--