Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id 43398B1E for ; Fri, 30 Nov 2018 17:38:18 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.7.6 Received: from mail-it1-f177.google.com (mail-it1-f177.google.com [209.85.166.177]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id B259D83A for ; Fri, 30 Nov 2018 17:38:17 +0000 (UTC) Received: by mail-it1-f177.google.com with SMTP id p197so10473925itp.0 for ; Fri, 30 Nov 2018 09:38:17 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=blockstream.io; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=QiePyLjmRr72SgKHtJK/0u8ggLh5XfdGx6yJaPSBl+o=; b=hMTjXfBMDn5c3in0d8NMnuoJSvYWOL9oQ4ap/W4tZrffrXI6xZC80CYUqiLuuQI7h/ pd01DJzch4xxj8rSzh1JuAA0TUilYarXYDw6j0ncZ6U37hxnJXQu6DAa/0u08x+BWgYW HhSA5dCjcPepslAoqvVSEsfo8V35pIT7FkYoA= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=QiePyLjmRr72SgKHtJK/0u8ggLh5XfdGx6yJaPSBl+o=; b=GUqe4yzVgnh6YJMsZB016xVVOG/+KINr3YxVCjfgRh/qkxDWCRKMIifCCHeL6V3tEW Z4yJjKTt+8zouAk8gPUckUy3QrURussPS8Qt/g4uFJ2zG8Os9Z+bAjxKB7gOML4EGGIb PvHJm9Tz1iIbb2rWppLTKrz6IYj/4QtaMN/xRjTCBZeP//MX0UC3rhgwQ0GflLzjVW0T SjEnv/oZxAnBb+aOTPIKIaiPhCdjMlwkv5BN7eCMDSMmO6JVn4OkTyMJ8rDr1o1o1j0k Gb15/aGjcSa3TEZGOU1soyzABVMYhwoIgMV3gZEi+5irMHvk/PaPf5p5xnF2EOgdxMfT Co/w== X-Gm-Message-State: AA+aEWazcfqRsRN8H9LWYb4zgQ96ZFIH6XgKeAlwavFwCUA9vFMt4BVV dZK86D/xhoWfnfZOdj2OMCQzkPIDTjAZwcHm7DZ6aEY06qo= X-Google-Smtp-Source: AFSGD/W8seSae14Am9kaxkIND2yOUR6CtpAURB0AKHmzNwDT9TYV5Wb0Ns/M6osV9yWEaMroOij/idE6zas0mpqNXnw= X-Received: by 2002:a24:1490:: with SMTP id 138mr7034622itg.101.1543599496929; Fri, 30 Nov 2018 09:38:16 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: "Russell O'Connor" Date: Fri, 30 Nov 2018 12:38:04 -0500 Message-ID: To: Matt Corallo , Bitcoin Protocol Discussion Content-Type: multipart/alternative; boundary="000000000000b0c182057be54372" X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, HTML_MESSAGE, RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org X-Mailman-Approved-At: Fri, 30 Nov 2018 22:37:38 +0000 Subject: Re: [bitcoin-dev] CPFP Carve-Out for Fee-Prediction Issues in Contracting Applications (eg Lightning) X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Nov 2018 17:38:18 -0000 --000000000000b0c182057be54372 Content-Type: text/plain; charset="UTF-8" On Fri, Nov 30, 2018 at 9:50 AM Matt Corallo via bitcoin-dev < bitcoin-dev@lists.linuxfoundation.org> wrote: > To partially-address the CPFP security model considerations, a next step > might involve tweaking Lightning's commitment transaction to have two > small-value outputs which are immediately spendable, one by each channel > participant, allowing them to chain children off without allowng > unrelated third-parties to chain children. Obviously this does not > address the specific attack so we need a small tweak to the anti-DoS > CPFP rules in Bitcoin Core/BIP 125: > It seems to me that this two-output scheme does address the specific attack without tweaking the RBF rules of BIP 125, since you are not doing an RBF at all. Suppose we have a 1k-vbyte unconfirmed transaction, TX0, with outputs Z, A, and B, where A and B are small outputs controlled by the participants Alice and Bob respectively, with a 1ksat fee, yielding a fee rate of 1sat/vbyte. Someone, maybe Alice, attempts to pin the transaction, maliciously or not, by attaching a 10k-vbyte transaction, TX1, to either output Z or output A, with a fee of 21ksats. This brings the fee rate for the TX0-TX1 package to 2sat/vbyte, being 11k-vbyte total size with 22ksats in total fees. Now Bob wants to CPFP to increase the effective fee rate of TX0 to 3sats/vbyte using output B. He attaches a 1k-vbyte transaction, TX2, to output B with a fee of 5ksats. This ought to create a new TX0-TX2 package with a 3sat/vbyte fee rate, being 2k-vbyte total size with 6ksats in total fees. TX1 has now been excluded from the package containing TX0. But TX1 hasn't been replaced, so the RBF rules from BIP125 don't apply. TX1 is still a valid unconfirmed transaction operating at a fee rate of 2.1sats/vbyte. That said, I'm not an expert on how packages and package fee rates are calculated in Bitcoin Core, so I am speculating a bit. And, because I'm talking with Matt, it's more likely that I'm mistaken. AFAIK, any rules about CPFP's behaviour in Bitcoin Core is undocumented. --000000000000b0c182057be54372 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
On Fri, Nov 30= , 2018 at 9:50 AM Matt Corallo via bitcoin-dev <bitcoin-dev@lists.linuxfoundation.org&= gt; wrote:
To partially-address the= CPFP security model considerations, a next step
might involve tweaking Lightning's commitment transaction to have two <= br> small-value outputs which are immediately spendable, one by each channel participant, allowing them to chain children off without allowng
unrelated third-parties to chain children. Obviously this does not
address the specific attack so we need a small tweak to the anti-DoS
CPFP rules in Bitcoin Core/BIP 125:

It = seems to me that this two-output scheme does address the specific attack wi= thout tweaking the RBF rules of BIP 125, since you are not doing an RBF at = all.

Suppose we have a 1k-vbyte unconfirmed transa= ction, TX0, with outputs Z, A, and B, where A and B are small outputs contr= olled by the participants Alice and Bob respectively, with a 1ksat fee, yie= lding a fee rate of 1sat/vbyte.
Someone, maybe Alice, attempts to= pin the transaction, maliciously or not, by attaching a 10k-vbyte transact= ion, TX1, to either output Z or output A, with a fee of 21ksats.=C2=A0 This= brings the fee rate for the TX0-TX1 package to 2sat/vbyte, being 11k-vbyte= total size with 22ksats in total fees.

Now Bob wa= nts to CPFP to increase the effective fee rate of TX0 to 3sats/vbyte using = output B.=C2=A0 He attaches a 1k-vbyte transaction, TX2, to output B with a= fee of 5ksats.=C2=A0 This ought to create a new TX0-TX2 package with a 3sa= t/vbyte fee rate, being 2k-vbyte total size with 6ksats in total fees.=C2= =A0 TX1 has now been excluded from the package containing TX0. But TX1 hasn= 't been replaced, so the RBF rules from BIP125 don't apply.=C2=A0 T= X1 is still a valid unconfirmed transaction operating at a fee rate of 2.1s= ats/vbyte.

That said, I'm not an expert on= how packages and package fee rates are calculated in Bitcoin Core, so I am= speculating a bit.=C2=A0 And, because I'm talking with Matt, it's = more likely that I'm mistaken.=C2=A0 AFAIK, any rules about CPFP's = behaviour in Bitcoin Core is undocumented.

=C2= =A0
--000000000000b0c182057be54372--