summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorZmnSCPxj <ZmnSCPxj@protonmail.com>2022-05-20 01:03:11 +0000
committerbitcoindev <bitcoindev@gnusha.org>2022-05-20 01:03:23 +0000
commit1468f60423b2538d0ebe6352c2ea77f868d5bbac (patch)
treebb0d82c6560333afd6b6914ddc1f5242d783894c
parent34a8eb5d2c45b1f096123f1cc960d4ae499ad748 (diff)
downloadpi-bitcoindev-1468f60423b2538d0ebe6352c2ea77f868d5bbac.tar.gz
pi-bitcoindev-1468f60423b2538d0ebe6352c2ea77f868d5bbac.zip
Re: [bitcoin-dev] CTV BIP Meeting #9 Notes
-rw-r--r--3b/479819190f11005fdb46049f0e39e177b67410152
1 files changed, 152 insertions, 0 deletions
diff --git a/3b/479819190f11005fdb46049f0e39e177b67410 b/3b/479819190f11005fdb46049f0e39e177b67410
new file mode 100644
index 000000000..f4a99c08b
--- /dev/null
+++ b/3b/479819190f11005fdb46049f0e39e177b67410
@@ -0,0 +1,152 @@
+Return-Path: <ZmnSCPxj@protonmail.com>
+Received: from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])
+ by lists.linuxfoundation.org (Postfix) with ESMTP id DA168C002D
+ for <bitcoin-dev@lists.linuxfoundation.org>;
+ Fri, 20 May 2022 01:03:23 +0000 (UTC)
+Received: from localhost (localhost [127.0.0.1])
+ by smtp1.osuosl.org (Postfix) with ESMTP id CFDD9844F1
+ for <bitcoin-dev@lists.linuxfoundation.org>;
+ Fri, 20 May 2022 01:03:23 +0000 (UTC)
+X-Virus-Scanned: amavisd-new at osuosl.org
+X-Spam-Flag: NO
+X-Spam-Score: -1.602
+X-Spam-Level:
+X-Spam-Status: No, score=-1.602 tagged_above=-999 required=5
+ tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
+ DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001,
+ FROM_LOCAL_NOVOWEL=0.5, RCVD_IN_MSPIKE_H2=-0.001,
+ SPF_HELO_PASS=-0.001, SPF_PASS=-0.001]
+ autolearn=ham autolearn_force=no
+Authentication-Results: smtp1.osuosl.org (amavisd-new);
+ dkim=pass (2048-bit key) header.d=protonmail.com
+Received: from smtp1.osuosl.org ([127.0.0.1])
+ by localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)
+ with ESMTP id gsDO8dxHIT24
+ for <bitcoin-dev@lists.linuxfoundation.org>;
+ Fri, 20 May 2022 01:03:22 +0000 (UTC)
+X-Greylist: domain auto-whitelisted by SQLgrey-1.8.0
+Received: from mail-4318.protonmail.ch (mail-4318.protonmail.ch [185.70.43.18])
+ by smtp1.osuosl.org (Postfix) with ESMTPS id 09021844F0
+ for <bitcoin-dev@lists.linuxfoundation.org>;
+ Fri, 20 May 2022 01:03:21 +0000 (UTC)
+Date: Fri, 20 May 2022 01:03:11 +0000
+DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=protonmail.com;
+ s=protonmail3; t=1653008599; x=1653267799;
+ bh=Vjea3/vGI7VnQbdvSeDjvdIS3xAvc6jX+KqVXibBm6g=;
+ h=Date:To:From:Reply-To:Subject:Message-ID:In-Reply-To:References:
+ Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID:
+ Message-ID;
+ b=hEsKwtue1mY7Y4sHkYPW8sKIcv+31L1aJrVnUixDs0iYIl8eqy+VOFMPTDv/Y6BCy
+ UDbg493dPwuy8VLehiLosXig5y0T41GXYpUr2IqmvIqHwyGcxSH6Mw0NwzHCFPbNQD
+ cdRzCTOeyhuYsYKo0Pt5cF9C5xT8HNJQpnTyM//JWYjdhKM7Hy/gKUE6Qr01NgR0v/
+ kr7SD7niVzdYv98ZHRs2GevO1D9m6hKKNnQXElRZKVtoGxn/FxN1I6d4V4Uk+EMST/
+ iFZyttbiulKzwpXS7f35TuONgr2xUAaAoDWIhannQADpK+725q8ZsmmhbRITZZTJri
+ gplaZvkn9nFhg==
+To: alicexbt <alicexbt@protonmail.com>,
+ Bitcoin Protocol Discussion <bitcoin-dev@lists.linuxfoundation.org>
+From: ZmnSCPxj <ZmnSCPxj@protonmail.com>
+Reply-To: ZmnSCPxj <ZmnSCPxj@protonmail.com>
+Message-ID: <4FE6Gygz1J6ehzVcTMyfSGbhSPvvkg06LjxqKy-lhPgGlYOGAbxgjYEkGBys8iE09FCOOU1rzq2GLqnMNjMhbstTTdtYNqzHWaLro1CA5FM=@protonmail.com>
+In-Reply-To: <Q26yJ8xABAnyKIAJ7nAt5er5Tok-tqvbQYhN7Wxh1xdlod-Kg5d7jefrxEgeini54ZIPup3jIGjmTx1gZBKEIjT7mYSQlXcTwG-Olo4pz8E=@protonmail.com>
+References: <Q26yJ8xABAnyKIAJ7nAt5er5Tok-tqvbQYhN7Wxh1xdlod-Kg5d7jefrxEgeini54ZIPup3jIGjmTx1gZBKEIjT7mYSQlXcTwG-Olo4pz8E=@protonmail.com>
+Feedback-ID: 2872618:user:proton
+MIME-Version: 1.0
+Content-Type: text/plain; charset=utf-8
+Content-Transfer-Encoding: quoted-printable
+Subject: Re: [bitcoin-dev] CTV BIP Meeting #9 Notes
+X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
+X-Mailman-Version: 2.1.15
+Precedence: list
+List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
+List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>,
+ <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
+List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
+List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
+List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
+List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>,
+ <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
+X-List-Received-Date: Fri, 20 May 2022 01:03:24 -0000
+
+Good morning fd0,
+
+
+> MEV could be one the issues associated with general covenants. There are =
+some resources on https://mev.day if anyone interested to read more about i=
+t.
+> 13:06 <@jeremyrubin> the covenants are "self executing" and can be e.g. s=
+andwiched13:07 <@jeremyrubin> so given that bitmatrix is sandwich attackabl=
+e, you'd see similar types of MEV as Eth sees13:07 <@jeremyrubin> v.s. the =
+MEV of e.g. lightning channels
+> 13:14 < _aj_> i guess i'd rather not have that sort of MEV available, bec=
+ause then it makes complicated MEV extraction profitable, which then makes =
+"smart" miners more profitable than "Dumb" ones, which is maybe centralisin=
+g
+
+Well that was interesting....
+
+TLDR: MEV =3D Miner-extractable value, basically if your contracts are comp=
+lex enough, miners can analyze which of the possible contract executions ar=
+e most profitable for them, and order transactions on the block they are bu=
+ilding in such a way that it is the most profitable path that gets executed=
+.
+(do correct me if that summary is inaccurate or incomplete)
+
+As a concrete example: in a LN channel breach condition, the revocation tra=
+nsaction must be confirmed within the CSV timeout, or else the theft will b=
+e accepted and confirmed.
+Now, some software will be aware of this timeout and will continually raise=
+ the fee of the revocation transaction per block.
+A rational miner which sees a channel breach condition might prefer to not =
+mine such a transaction, since if it is not confirmed, the software will bu=
+mp up the fees and the miner could try again on the next block with the hig=
+her feerates.
+Depending on the channel size and how the software behaves exactly, the min=
+er may be able to make a decision on whether it should or should not work o=
+n the revocation transaction and instead hold out for a later higher fee.
+
+Now, having thought of this problem for no more than 5 minutes, it seems to=
+ me, naively, that a mechanism with privacy would be helpful, i.e. the cont=
+ract details should be as little-revealed as possible, to reduce the scope =
+of miner-extractable value.
+For instance, Taproot is good since only one branch at a time can be reveal=
+ed, however, in case of a dispute, multiple competing branches of the Tapro=
+ot may be revealed by the disputants, and the miners may now be able to mak=
+e a choice.
+
+Probably, it is best if our covenants systems take full advantage of the li=
+nearity of Schnorr signing, in that case, if there is at all some kind of b=
+ranch involved; for example, a previous transaction may reveal, if you have=
+ the proper adaptor signature, some scalar, and that scalar is actually the=
+ `s` component for a signature of a different transaction.
+Without knowledge of the adaptor signature, and without knowledge of the li=
+nk between this previous transaction and some other one, a miner cannot ext=
+ract additional value by messing with the ordering the transactions get con=
+firmed on the blockchain, or whatever.
+
+This may mean that mechanisms that inspect the block outside of the transac=
+tion being validated (e.g. `OP_BRIBE` for drivechains, or similar mechanism=
+s that might be capable of looking beyond the transaction) should be verbot=
+en; such cross-transaction introspection should require an adaptor signatur=
+e that is kept secret by the participants from the miner that might want to=
+ manipulate the transactions to make other alternate branches more favorabl=
+e to the miner.
+
+In addition, covenant mechanisms that require large witness data are probab=
+ly more vulnerable to MEV.
+For instance, if in a dispute case, one of the disputants needs to use a la=
+rge witness data while the other requires a smaller one, then the disputant=
+ with the smaller witness data would have an advantage, and can match the f=
+ee offered by the disputant with the larger witness.
+Then a fee-maximizing miner would prefer the smaller-witness branch of the =
+contract, as they get more fees for less blockspace.
+Of course, this mechanism itself can be used if we can arrange that the dis=
+putant that is inherently "wrong" (i.e. went against the expected behavior =
+of the protocol) is the one that is burdened with the larger witness.
+
+Or I could be entirely wrong and MEV is something even worse than that.
+
+Hmmmmmm
+
+Regards,
+ZmnSCPxj
+