summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAntoine Riard <antoine.riard@gmail.com>2020-05-06 05:06:11 -0400
committerbitcoindev <bitcoindev@gnusha.org>2020-05-06 09:06:24 +0000
commitaed43a647dfb0d5524a0adf6a8234ee0f2dee0ee (patch)
treebc1e6c693b938b31e5ea783525b97472c4154b53
parent57163628c9a14e0b9bceac5fd341862ca9068371 (diff)
downloadpi-bitcoindev-aed43a647dfb0d5524a0adf6a8234ee0f2dee0ee.tar.gz
pi-bitcoindev-aed43a647dfb0d5524a0adf6a8234ee0f2dee0ee.zip
Re: [bitcoin-dev] On the scalability issues of onboarding millions of LN mobile clients
-rw-r--r--e4/9285e90ad4114311260457497da31e2f0c7356237
1 files changed, 237 insertions, 0 deletions
diff --git a/e4/9285e90ad4114311260457497da31e2f0c7356 b/e4/9285e90ad4114311260457497da31e2f0c7356
new file mode 100644
index 000000000..8e03b4355
--- /dev/null
+++ b/e4/9285e90ad4114311260457497da31e2f0c7356
@@ -0,0 +1,237 @@
+Return-Path: <antoine.riard@gmail.com>
+Received: from fraxinus.osuosl.org (smtp4.osuosl.org [140.211.166.137])
+ by lists.linuxfoundation.org (Postfix) with ESMTP id EC84CC0859;
+ Wed, 6 May 2020 09:06:24 +0000 (UTC)
+Received: from localhost (localhost [127.0.0.1])
+ by fraxinus.osuosl.org (Postfix) with ESMTP id D3D9086914;
+ Wed, 6 May 2020 09:06:24 +0000 (UTC)
+X-Virus-Scanned: amavisd-new at osuosl.org
+Received: from fraxinus.osuosl.org ([127.0.0.1])
+ by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)
+ with ESMTP id gE1UvNe7JeG8; Wed, 6 May 2020 09:06:24 +0000 (UTC)
+X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6
+X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6
+Received: from mail-pl1-f170.google.com (mail-pl1-f170.google.com
+ [209.85.214.170])
+ by fraxinus.osuosl.org (Postfix) with ESMTPS id 1F2218690E;
+ Wed, 6 May 2020 09:06:24 +0000 (UTC)
+Received: by mail-pl1-f170.google.com with SMTP id t16so227666plo.7;
+ Wed, 06 May 2020 02:06:24 -0700 (PDT)
+DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
+ h=mime-version:references:in-reply-to:from:date:message-id:subject:to
+ :cc; bh=KYLwFIMTdZKUf2InUbVu4YrNjy/wNM4ifD/Z2h65KaM=;
+ b=MVB6D3Qr8IyhzhdFHWnwI7EiAPG4cKQzXqcp3S3RYWDTMTf6renuSis9vjaNFCzncZ
+ pi4bJ+9UjWV1BulZfQH4GlUFswmJpFgDXSrK+dUI9ioama1QoaM8F9TwZJev420qx9Iv
+ UwvVmvK1r3h7t3arbjuv333m9YdHqzOSqXIahLQ9GySQaYZstE4+3nnuqGfTUFrKlxb+
+ qI/Zfq5qXrG6HtHwAjI8lh7paQ+BtXEfW0hxugROcU1ZFktHrvknCTswk/IrNJjp2wiY
+ PQO0Av2aSAf/zPauq2S7zaX5pqTbnFUkl4Q+keg/A/9Fzz2gr7ZssmtnKzfWQ2ii7H+G
+ zoBQ==
+X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
+ d=1e100.net; s=20161025;
+ h=x-gm-message-state:mime-version:references:in-reply-to:from:date
+ :message-id:subject:to:cc;
+ bh=KYLwFIMTdZKUf2InUbVu4YrNjy/wNM4ifD/Z2h65KaM=;
+ b=BQn1fWZe4n+1aPP6YPLrB6PJC0Q92IdjfMFpaohvDD2EdEfHo3sOnSRy+tqhK/w9JG
+ 53Of/Ti7c0hLZ+7Z/RHMOoBONgBSCxcStO2Aul+GOE7EHxfbIr7ZI5lp+XZkuzfBdVxw
+ l4a9yxg9fjyhwjXjhCjWgZHIlnrdK3ggE7Tyte6QzmMhHVfvt9TLqO2gxPzMDBDc4uCR
+ 4xtF53QmPUmdryQjWCx05G1WqWKu2m+McBwBU/SneCCuYRzAIYjNF2d0hkdiocoWcGHO
+ V+pBn6Cf7l+2ojiQvryxTxRV0AQeThMaQ0LOsXkP7oolf2/H3djlKVtNJirbwKfWjVBp
+ XrWQ==
+X-Gm-Message-State: AGi0PubJmwZ1sKUlCwZbMVRpvWSdVba2nX/y5shlVVBrvLDZ/qQIoJ3F
+ ZC4r09sKp/myp+hipBdsh4KZ/K9XHa2Qas/VlYM=
+X-Google-Smtp-Source: APiQypKg4KG3tu9+Vas0e25EU1VEUswrR+OVC4MK99v7X9NbP/QS12D5Da0J8XPT4/dkrsWCZkPo4985H6YO08s9QFs=
+X-Received: by 2002:a17:90a:266c:: with SMTP id
+ l99mr8199225pje.186.1588755983538;
+ Wed, 06 May 2020 02:06:23 -0700 (PDT)
+MIME-Version: 1.0
+References: <CALZpt+GBPbf+Pgctm5NViNons50aQs1RPQkEo3FW5RM4fL9ztA@mail.gmail.com>
+ <202005051300.38836.luke@dashjr.org>
+In-Reply-To: <202005051300.38836.luke@dashjr.org>
+From: Antoine Riard <antoine.riard@gmail.com>
+Date: Wed, 6 May 2020 05:06:11 -0400
+Message-ID: <CALZpt+GR8L6Zo_4A8LJb=yndr32g62XFKBmGiWMSRaZqHrfOog@mail.gmail.com>
+To: Luke Dashjr <luke@dashjr.org>
+Content-Type: multipart/alternative; boundary="000000000000089d3605a4f71420"
+X-Mailman-Approved-At: Wed, 06 May 2020 13:25:00 +0000
+Cc: Bitcoin Protocol Discussion <bitcoin-dev@lists.linuxfoundation.org>,
+ "lightning-dev\\\\@lists.linuxfoundation.org"
+ <lightning-dev@lists.linuxfoundation.org>
+Subject: Re: [bitcoin-dev] On the scalability issues of onboarding millions
+ of LN mobile clients
+X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
+X-Mailman-Version: 2.1.15
+Precedence: list
+List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
+List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>,
+ <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
+List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
+List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
+List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
+List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>,
+ <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
+X-List-Received-Date: Wed, 06 May 2020 09:06:25 -0000
+
+--000000000000089d3605a4f71420
+Content-Type: text/plain; charset="UTF-8"
+Content-Transfer-Encoding: quoted-printable
+
+I do see the consensus capture argument by miners but in reality isn't this
+attack scenario have a lot of assumptions on topology an deployment ?
+
+For such attack to succeed you need miners nodes to be connected to clients
+to feed directly the invalid headers and if these ones are connected to
+headers/filters gateways, themselves doing full-nodes validation invalid
+chain is going to be sanitized out ?
+
+Sure now you trust these gateways, but if you have multiple connections to
+them and can guarantee they aren't run by the same entity, that maybe an
+acceptable security model, depending of staked amount and your
+expectations. I more concerned of having a lot of them and being
+diversified enough to avoid collusion between gateways/chain access
+providers/miners.
+
+But even if you light clients is directly connected to the backbone network
+and may be reached by miners you can implement fork anomalies detection and
+from then you may have multiples options:
+* halt the wallet, wait for human intervention
+* fallback connection to a trusted server, authoritative on your chain view
+* invalidity proofs?
+
+Now I agree you need a wide-enough, sane backbone network to build on top,
+and we should foster node adoption as much as we can.
+
+Le mar. 5 mai 2020 =C3=A0 09:01, Luke Dashjr <luke@dashjr.org> a =C3=A9crit=
+ :
+
+> On Tuesday 05 May 2020 10:17:37 Antoine Riard via bitcoin-dev wrote:
+> > Trust-minimization of Bitcoin security model has always relied first an=
+d
+> > above on running a full-node. This current paradigm may be shifted by L=
+N
+> > where fast, affordable, confidential, censorship-resistant payment
+> services
+> > may attract a lot of adoption without users running a full-node.
+>
+> No, it cannot be shifted. This would compromise Bitcoin itself, which for
+> security depends on the assumption that a supermajority of the economy is
+> verifying their incoming transactions using their own full node.
+>
+> The past few years has seen severe regressions in this area, to the point
+> where Bitcoin's future seems quite bleak. Without serious improvements to
+> the
+> full node ratio, Bitcoin is likely to fail.
+>
+> Therefore, all efforts to improve the "full node-less" experience are
+> harmful,
+> and should be actively avoided. BIP 157 improves privacy of fn-less usage=
+,
+> while providing no real benefits to full node users (compared to more
+> efficient protocols like Stratum/Electrum).
+>
+> For this reason, myself and a few others oppose merging support for BIP
+> 157 in
+> Core.
+>
+> > Assuming a user adoption path where a full-node is required to benefit
+> for
+> > LN may deprive a lot of users, especially those who are already denied =
+a
+> > real financial infrastructure access.
+>
+> If Bitcoin can't do it, then Bitcoin can't do it.
+> Bitcoin can't solve *any* problem if it becomes insecure itself.
+>
+> Luke
+>
+> P.S. See also
+>
+> https://medium.com/@nicolasdorier/why-i-dont-celebrate-neutrino-206bafa5f=
+da0
+>
+> https://medium.com/@nicolasdorier/neutrino-is-dangerous-for-my-self-sover=
+eignty-18fac5bcdc25
+>
+
+--000000000000089d3605a4f71420
+Content-Type: text/html; charset="UTF-8"
+Content-Transfer-Encoding: quoted-printable
+
+<div dir=3D"ltr"><div>I do see the consensus capture argument by miners but=
+ in reality isn&#39;t this attack scenario have a lot of assumptions on top=
+ology an deployment ?<br><br></div><div>For such attack to succeed you need=
+ miners nodes to be connected to clients to feed directly the invalid heade=
+rs and if these ones are connected to headers/filters gateways, themselves =
+doing full-nodes validation invalid chain is going to be sanitized out ?<br=
+><br></div><div>Sure now you trust these gateways, but if you have multiple=
+ connections to them and can guarantee they aren&#39;t run by the same enti=
+ty, that maybe an acceptable security model, depending of staked amount and=
+ your expectations. I more concerned of having a lot of them and being dive=
+rsified enough to avoid collusion between gateways/chain access providers/m=
+iners.<br><br></div><div>But even if you light clients is directly connecte=
+d to the backbone network and may be reached by miners you can implement fo=
+rk anomalies detection and from then you may have multiples options:<br></d=
+iv><div>* halt the wallet, wait for human intervention<br></div><div>* fall=
+back connection to a trusted server, authoritative on your chain view<br></=
+div><div>* invalidity proofs?<br><br></div><div>Now I agree you need a wide=
+-enough, sane backbone network to build on top, and we should foster node a=
+doption as much as we can.<br></div></div><br><div class=3D"gmail_quote"><d=
+iv dir=3D"ltr" class=3D"gmail_attr">Le=C2=A0mar. 5 mai 2020 =C3=A0=C2=A009:=
+01, Luke Dashjr &lt;<a href=3D"mailto:luke@dashjr.org">luke@dashjr.org</a>&=
+gt; a =C3=A9crit=C2=A0:<br></div><blockquote class=3D"gmail_quote" style=3D=
+"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-le=
+ft:1ex">On Tuesday 05 May 2020 10:17:37 Antoine Riard via bitcoin-dev wrote=
+:<br>
+&gt; Trust-minimization of Bitcoin security model has always relied first a=
+nd<br>
+&gt; above on running a full-node. This current paradigm may be shifted by =
+LN<br>
+&gt; where fast, affordable, confidential, censorship-resistant payment ser=
+vices<br>
+&gt; may attract a lot of adoption without users running a full-node.<br>
+<br>
+No, it cannot be shifted. This would compromise Bitcoin itself, which for <=
+br>
+security depends on the assumption that a supermajority of the economy is <=
+br>
+verifying their incoming transactions using their own full node.<br>
+<br>
+The past few years has seen severe regressions in this area, to the point <=
+br>
+where Bitcoin&#39;s future seems quite bleak. Without serious improvements =
+to the <br>
+full node ratio, Bitcoin is likely to fail.<br>
+<br>
+Therefore, all efforts to improve the &quot;full node-less&quot; experience=
+ are harmful, <br>
+and should be actively avoided. BIP 157 improves privacy of fn-less usage, =
+<br>
+while providing no real benefits to full node users (compared to more <br>
+efficient protocols like Stratum/Electrum).<br>
+<br>
+For this reason, myself and a few others oppose merging support for BIP 157=
+ in <br>
+Core.<br>
+<br>
+&gt; Assuming a user adoption path where a full-node is required to benefit=
+ for<br>
+&gt; LN may deprive a lot of users, especially those who are already denied=
+ a<br>
+&gt; real financial infrastructure access.<br>
+<br>
+If Bitcoin can&#39;t do it, then Bitcoin can&#39;t do it.<br>
+Bitcoin can&#39;t solve *any* problem if it becomes insecure itself.<br>
+<br>
+Luke<br>
+<br>
+P.S. See also<br>
+<a href=3D"https://medium.com/@nicolasdorier/why-i-dont-celebrate-neutrino-=
+206bafa5fda0" rel=3D"noreferrer" target=3D"_blank">https://medium.com/@nico=
+lasdorier/why-i-dont-celebrate-neutrino-206bafa5fda0</a><br>
+<a href=3D"https://medium.com/@nicolasdorier/neutrino-is-dangerous-for-my-s=
+elf-sovereignty-18fac5bcdc25" rel=3D"noreferrer" target=3D"_blank">https://=
+medium.com/@nicolasdorier/neutrino-is-dangerous-for-my-self-sovereignty-18f=
+ac5bcdc25</a><br>
+</blockquote></div>
+
+--000000000000089d3605a4f71420--
+