Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id BFC7FF16 for ; Wed, 30 Jan 2019 20:58:32 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.7.6 Received: from mail-wm1-f54.google.com (mail-wm1-f54.google.com [209.85.128.54]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id 031653F7 for ; Wed, 30 Jan 2019 20:58:31 +0000 (UTC) Received: by mail-wm1-f54.google.com with SMTP id d15so303102wmb.3 for ; Wed, 30 Jan 2019 12:58:31 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=f+mneEs77bjs/U4x+sHhvPg7QPHRTlDbNNyLBcVx5NQ=; b=giltNvNA0E4hlNFWx+yrhXLxjVX3rctP+icrIraRkE0nxPeVZws/N/vrXHe5AfbuRm lWvAmXsyvY8dbpDdTsLg4Lz8cll9UlODFNsQXxz3MbaV9Mxea26rKgF7Pg/DBC/grMaw I9Rx/5uiw8WX9b1jc+KB6J2gKUdpCTSGOPXqGY2SLwO6adTxXRdTRhyr4MmgrKhvaIem yDVmWWTzRWOx+fX9O9GiEjZf9efsf662n8b8JgLB0ybvxbPmj7DhaQOHaYc66od9/gC+ 3/i2d46LyQAZluzQbodSSHcWiHv/kgZLDmSfyZiXx8kIvNQTHZ8QtBobzeIGVEKA4Wr/ dYEQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=f+mneEs77bjs/U4x+sHhvPg7QPHRTlDbNNyLBcVx5NQ=; b=FDgyVodV4mv/Fziu/8RmPq33z6cTlzyWWVpGmijOQsgiuey0JqT5jxJaR45XWvo9rZ QeSwLMePxdAU7z0gE74CUTgcahxysTZJWZXrmjkWVbV5qVs/szNyXJKih25/WunL0wzt c3rRDBulvT5lMFefUXksVpn2LOJRcMkY0Bh+CjD/QCAWhuWo80ryHzIuTJWsRLm8QnVc 6p8aetGX4Xv6MGtW4H9U2iIvi8v42M6ovheCNFvfNO3MpSw+GbYg1qc8AaygbEsnPH1R mIn+RJWDpaDX/wNVsgEjrt94bUyVccL5m07h/Bs7O/eKDmxwXE5K/fenp7tZXPOV8K6E 1cNw== X-Gm-Message-State: AJcUukdjmGTFQ5nCC0vi+rj5D8BLQQj6PA6ydsV5qJho+yZzyQBqK5Iy etrTJ61rpGrllT9xahJt9xoiG3/FdwzBCT9cpvs= X-Google-Smtp-Source: ALg8bN6tJxefGNrshBZnnP8IvxGRRViy1FH9VHAskoyUG3RFRBocU+J4ZBM8LgIW2ZG1QKAqGxdLypqAykksF4WSWyY= X-Received: by 2002:a1c:8b44:: with SMTP id n65mr27873433wmd.104.1548881910313; Wed, 30 Jan 2019 12:58:30 -0800 (PST) MIME-Version: 1.0 References: <-yZhdFkKfKAEz1_4GKKSpTxjvR8EDSsH_5-TTh_4X5qwa79igXKR14rh6JASrald-F97o1htWY_kcBQ7IVr7ZH9zOQlOEwzhkWDjTq0d7F4=@protonmail.com> <2cd4fe6d-c0ca-5ae7-4107-38e1609743a8@gmail.com> In-Reply-To: From: James MacWhyte Date: Wed, 30 Jan 2019 12:58:03 -0800 Message-ID: To: rhavar@protonmail.com Content-Type: multipart/alternative; boundary="0000000000001038d60580b32c9e" X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, FREEMAIL_FROM, HTML_MESSAGE, RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org X-Mailman-Approved-At: Thu, 31 Jan 2019 17:00:54 +0000 Cc: Bitcoin Protocol Discussion Subject: Re: [bitcoin-dev] bustapay BIP :: a practical sender/receiver coinjoin protocol X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Jan 2019 20:58:32 -0000 --0000000000001038d60580b32c9e Content-Type: text/plain; charset="UTF-8" On Tue, Jan 29, 2019 at 6:46 PM wrote: > > If the sender refuses to sign the final transaction, the receiver just > propagates the template transaction which pays the receiver! So it's a > pretty weak attack. > > The only real attack is that the sender could double-spend the > template-transaction before it's propagated, but the cost of doing this > isn't free, as at the very least you need to pay the transaction fees of > creating a double spend. It's not an amazingly good defence, but it's good > enough that it's unlikely to get abused (and an attacker would only learn a > single utxo of the receiver) . > Okay, I see what you mean. I better understand the weaknesses you've identified, and I can't really think of a better solution than what you've proposed. I also realized that implementors who aren't capable of integrating signing and UTXO validation wouldn't be the ones trying to implement this feature, so my concerns there are also moot. Carry on ;) --0000000000001038d60580b32c9e Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable


=
On Tue, Jan 29, 2019 at 6:46 PM <<= a href=3D"mailto:rhavar@protonmail.com">rhavar@protonmail.com> wrote= :

If the sender refuses to sign the final transaction, the receiver just pr= opagates the template transaction which pays the receiver! So it's a pr= etty weak attack.

The only real attack is that= the sender could double-spend the template-transaction before it's pro= pagated, but the cost of doing this isn't free, as at the very least yo= u need to pay the transaction fees of creating a double spend. It's not= an amazingly good defence, but it's good enough that it's unlikely= to get abused (and an attacker would only learn a single utxo of the recei= ver) .

Okay, I see what you mean. I b= etter understand the weaknesses you've identified, and I can't real= ly think of a better solution than what you've proposed. I also realize= d that implementors who aren't capable of integrating signing and UTXO = validation wouldn't be the ones trying to implement this feature, so my= concerns there are also moot. Carry on ;)
--0000000000001038d60580b32c9e--