Return-Path: Received: from smtp2.osuosl.org (smtp2.osuosl.org [140.211.166.133]) by lists.linuxfoundation.org (Postfix) with ESMTP id BB6F2C002D for ; Thu, 27 Oct 2022 09:57:01 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp2.osuosl.org (Postfix) with ESMTP id A285740140 for ; Thu, 27 Oct 2022 09:57:01 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org A285740140 Authentication-Results: smtp2.osuosl.org; dkim=pass (2048-bit key) header.d=synonym-to.20210112.gappssmtp.com header.i=@synonym-to.20210112.gappssmtp.com header.a=rsa-sha256 header.s=20210112 header.b=AC6GLhhL X-Virus-Scanned: amavisd-new at osuosl.org X-Spam-Flag: NO X-Spam-Score: -1.897 X-Spam-Level: X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no Received: from smtp2.osuosl.org ([127.0.0.1]) by localhost (smtp2.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aw_NRmZyyEce for ; Thu, 27 Oct 2022 09:56:58 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.8.0 DKIM-Filter: OpenDKIM Filter v2.11.0 smtp2.osuosl.org 127D84013E Received: from mail-il1-x136.google.com (mail-il1-x136.google.com [IPv6:2607:f8b0:4864:20::136]) by smtp2.osuosl.org (Postfix) with ESMTPS id 127D84013E for ; Thu, 27 Oct 2022 09:56:57 +0000 (UTC) Received: by mail-il1-x136.google.com with SMTP id s9so658849ilu.1 for ; Thu, 27 Oct 2022 02:56:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=synonym-to.20210112.gappssmtp.com; s=20210112; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=FIuZRRG4GZXSuf9tl6WzLrLcW14+IbJnqregRVVnavU=; b=AC6GLhhLNzFR6v87AiUVTGpa/FWW6KCQX8AHO13InMMB6Arif7jeZ79r5+p/2YhdX6 z+IOrH7MEuMSwmFpBF4Vpmg9FmsdXH4v5v5ONVDCz98fXX0P0BG6fFrsVTkn9KG778HD hWDOiwxm+7BeFdWde0xQbxIHs4PriyGW+Kvn2vfYEKBb+2CIl6y1pfSanbaKwXy92opp nKaqlS5PjTSjSPlBTVE+dfjUh5JcPduGf0fdLEZBbuErLSOzFnw8DAgG0TGM0QtgUdTA ZJJF4R/6pRRgQVFS0g5VljI60w2ie7SJzy/Fb9Em6by2F72ttCShBDq2jWmaotVcJAbp No1A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=FIuZRRG4GZXSuf9tl6WzLrLcW14+IbJnqregRVVnavU=; b=LQzLTbHh/neUr/VRaAg31wwe39N4NCTXFoLI+gwvNEn86ehkgI0jSQz/v8r1uR30P6 j1FY5ovDneKQCpRX2CLGOdRVFVASO3gGw+dnWSPP4lm4tqliejpIcWQkBINVKEc3kpj4 Zoi5KL/noezWFHsg20CSIcuZUJlsEBtpv0pepLTdJfg3uEkdX6Iws7uWYZTRp4D48c2n mFecyTag1ub72FGh3gHOaOJHLca5lPhG/WVH75173LOQxhjWXDeHwIP5H4CgvBTzw4dD xXT9isQGG47DuxAm/Ffw7Df6fLNftmu9aEYhUcoiYiIJxW9lWDq/XOGl+Tx1CDKuevSM k2sQ== X-Gm-Message-State: ACrzQf1CY2y7xH5BSDqbjJRrJGLdTA8xVTfw+dNzsgbjosNee8xMTUjj j4uyssDUcWx5n2C5XYl9jch+iwv25Ge7v3BZCfrP/Hdr2G1TxLxNG1g= X-Google-Smtp-Source: AMsMyM7d/PbJABDKwgYofh4NHepv83z+K6tX4l8kkqtuLgaY8QhP51LDRfInBRWWvXxfw/6EN6qa+n5LF3Rh1LhQWVk= X-Received: by 2002:a05:6e02:12ee:b0:300:716f:7dc4 with SMTP id l14-20020a056e0212ee00b00300716f7dc4mr2418515iln.108.1666864616619; Thu, 27 Oct 2022 02:56:56 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: John Carvalho Date: Thu, 27 Oct 2022 11:56:45 +0200 Message-ID: To: bitcoin-dev Content-Type: multipart/alternative; boundary="0000000000005cda7805ec012908" X-Mailman-Approved-At: Thu, 27 Oct 2022 10:43:39 +0000 Subject: Re: [bitcoin-dev] On mempool policy consistency X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Oct 2022 09:57:01 -0000 --0000000000005cda7805ec012908 Content-Type: text/plain; charset="UTF-8" Anthony, I took the time to read your whole post. Despite a diplomatic tone, I find your takeaways from all your references to remain conveniently biased for protecting the plan of RBF via passive aggression. You show multiple examples where, when I read them, I assume the next thing you will say will be "so we really should stop trying to impose optional features, particularly when they affect existing use cases" but instead you persist. The problem is that RBF has already been an option for years, and anyone that wants to use it can. Any escalation in Bitcoin Core code to support it more deeply, or by default, is basically an unfair advantage to force the market to do what it already has decided not to. If wallets want to default to RBF, they can already do so, as evidenced by Green Wallet (which I stopped using because it breaks the UX at Bitrefill). Instead of Core devs admitting RBF is a minority use case, you seem to be proposing that the market should now be obligated to prove it can defeat RBF in a stronger form if it really wants to prove other use cases. This is oppressive, dark-pattern design. We all know that Core has little ability to sense the market, and the market has little ability to express itself to Core. The idea that the market can always downvote or defeat a feature or new complexity proposal is idealistic and unrealistic. Superficial features should be decided at the surface (app level) not in the protocol or node. The default answer to ALL proposals is "No." Changes need to win market acceptance, not get special access through Core devs baking them deeper and deeper into the protocol and policies until everyone is forced into a new design. As I mentioned before, this behavior, if we are lucky, will result in more mempool types, more implementations, and a more-difficult to modify protocol, but ALL feature changes, default settings that make decisions for users, and even all scaling changes, are speculative risks with unpredictable outcomes. I urge the culture of Core to respect these dynamics and become much more conservative with proposing change. Please focus on efficiencies, bugs, cleanup, reducing overhead, etc. The current RBF movement feels like Core is strong-arming and shoe-horning in a change that the market is not actually asking for. It is okay to leave things as they are. It is okay if RBF remains a niche feature. It is not okay for a small group of RBF-interested engineers to make commercial Bitcoin use cases worse. Let us realize the Bitcoin we already have. We already have a largely unexplored canvas of taproot, lightning, UX, etc. I expect the things I do with Bitcoin today to work FOREVER. -- John Carvalho CEO, Synonym.to > Date: Thu, 27 Oct 2022 09:52:10 +1000 > From: Anthony Towns > To: Bitcoin Protocol Discussion > > Subject: [bitcoin-dev] On mempool policy consistency > Message-ID: > Content-Type: text/plain; charset=us-ascii > > Hi *, > > TLDR: Yes, this post is too long, and there's no TLDR. If it's any > consolation, it took longer to write than it does to read? > > On Tue, Jun 15, 2021 at 12:55:14PM -0400, Antoine Riard via bitcoin-dev > wrote: > > Subject: Re: [bitcoin-dev] Proposal: Full-RBF in Bitcoin Core 24.0 > > I'm writing to propose deprecation of opt-in RBF in favor of full-RBF > > > If there is ecosystem agreement on switching to full-RBF, but 0.24 sounds > > too early, let's defer it to 0.25 or 0.26. I don't think Core has a > > consistent deprecation process w.r.t to policy rules heavily relied-on by > > Bitcoin users, if we do so let sets a precedent satisfying as many folks > as > > we can. > > One precedent that seems to be being set here, which to me seems fairly > novel for bitcoin core, is that we're about to start supporting and > encouraging nodes to have meaningfully different mempool policies. From > what I've seen, the baseline expectation has always been that while > certainly mempools can and will differ, policies will be largely the same: > > Firstly, there is no "the mempool". There is no global mempool. Rather > each node maintains its own mempool and accepts and rejects transaction > to that mempool using their own internal policies. Most nodes have > the same policies, but due to different start times, relay delays, > and other factors, not every node has the same mempool, although they > may be very similar. > > - > https://bitcoin.stackexchange.com/questions/98585/how-to-find-if-two-transactions-in-mempool-are-conflicting > > Up until now, the differences between node policies supported by different > nodes running core have been quite small, with essentially the following > options available: > > -minrelaytxfee, -maxmempool - changes the lowest fee rate you'll accept > > -mempoolexpiry - how long to keep txs in the mempool > > -datacarrier - reject txs creating OP_RETURN outputs > > -datacarriersize - maximum size of OP_RETURN data > > -permitbaremultisig - prevent relay of bare multisig > > -bytespersigop - changes how SIGOP accounting works for relay and > mining prioritisation > > as well as these, marked as "debug only" options (only shown with > -help-debug): > > -incrementalrelayfee - make it easier/harder to spam txs by only > slightly bumping the fee; marked as a "debug only" option > > -dustrelayfee - make it easier/harder to create uneconomic utxos; > marked as a "debug only" option > > -limit{descendant,ancestor}{count,size} - changes how large the > transaction chains can be; marked as a "debug only" option > > and in theory, but not available on mainnet: > > -acceptnonstdtxn - relay/mine non standard transactions > > There's also the "prioritisetransaction" rpc, which can cause you to keep > a low feerate transaction in your mempool longer than you might otherwise. > > I think that -minrelaytxfee, -maxmempool and -mempoolexpiry are the only > ones of those options commonly set, and those only rarely result in any > differences in the txs at the top of the mempool. > > There are also quite a few parameters that aren't even runtime > configurable: > > - MAX_STANDARD_TX_WEIGHT > - MIN_STANDARD_TX_NONWITNESS_SIZE (see also #26265) > - MAX_P2SH_SIGOPS (see also #26348) > - MAX_STANDARD_TX_SIGOPS_COST > - MAX_STANDARD_P2WSH_STACK_ITEMS > - MAX_STANDARD_P2WSH_STACK_ITEM_SIZE > - MAX_STANDARD_TAPSCRIPT_STACK_ITEM_SIZE > - MAX_STANDARD_P2WSH_SCRIPT_SIZE > - MAX_STANDARD_SCRIPTSIG_SIZE > - EXTRA_DESCENDANT_TX_SIZE_LIMIT > - MAX_REPLACEMENT_CANDIDATES > > And other plausible options aren't configurable even at compile time > -- eg, core doesn't implement BIP 125's inherited signalling rule so > there's no way to enable it; core doesn't allow opting out of BIP 125 > rule 3 ratchet on absolute fee; core doesn't allow CPFP carveout with > more than 1 ancestor; core doesn't allow opting out of LOW_S checks > (even via -acceptnonstdtxn); etc. > > We also naturally have different mempool policies between different > releases: eg, expansions of policy, such as allowing OP_RETURN or > expanding it from 40 to 80 bytes or new soft forks where old nodes won't > relay transactions that use the new; and also occassional restrictions > in policy, such as the LOW_S requirement. > > > While supporting and encouraging different mempool polices might be new > for core, it's not new for knots: knots changes some of these defaults > (-permitbaremultisig defaults to false, -datacarriersize is reduced to > 42), allows the use of -acceptnonstdtxn on mainnet, and introduces new > options including -spkreuse and -mempoolreplacement (giving the latter > full rbf behaviour by default). Knots also includes a `-corepolicy` > option to make it easy to get a configuration matching core's defaults. > > > I think gmaxwell's take from Feb 2015 (in the context of how restrictive > policy on OP_RETURN data should be) was a reasonable description for > core's approach up until now: > > There is also a matter of driving competent design rather than lazy > first thing that works. E.g. In stealth addresses the early proposals > use highly inefficient single ECDH point per output instead of simply > pooling them. Network behavior is one of the few bits of friction > driving good technical design rather than "move fast, break things, and > force everyone else onto my way of doing thing rather than discussing > the design in public". No one wants to be an outright gatekeeper, > but the network is a shared resource and it's perfectly reasonable > node behavior to be stingy about the perpetual storage impact of the > transactions they're willing to process, especially when it comes to > neutral technical criteria like the amount of network irrelevant data > stuffed in transactions. > > There is also a very clear pattern we've seen in the past where > people take anything the system lets them do as strong evidence that > they have a irrevocable right to use the system in that way, and that > their only responsibility-- and if their usage harms the system it's > the responsibility of the system to not permit it. [... > ...] For mitigating these risks it's optimal if transactions > seem as uniform and indistinguishable as reasonably possible. > > - https://github.com/bitcoin/bitcoin/pull/5286#issuecomment-72564175 > > Perhaps see also sdaftuar in Nov 2015, > > To me the most important question is, is priority something that miners > want to use? > > If a non-negligible amount of hashpower intends to use it in their > transaction selection, then I think it makes sense for nodes to use it > too, because it's generally helpful to have your mempool predict the > UTXO as much as possible, and for nodes to be able to have reasonable > fee and priority estimates (which won't happen unless they track the > priority transactions somehow -- I'm presuming that miners run with > much bigger mempools than regular nodes). > > If the answer is no, then that's fine and I don't see a reason to push > in this direction. I sort of assumed there was enough hashpower mining > with priority, since last time I checked estimatepriority was still > giving meaningful results for low-ish blockheights, but I haven't done > any kind of real analysis. > > - https://github.com/bitcoin/bitcoin/pull/6992#issuecomment-155969455 > > or in June 2019, > > What this PR is proposing is to get rid of a command-line option that is > (a) a footgun for users and (b) does not reflect what I believe to be > the understanding most users have, which is that [X txs] are expected > to propagate well on the network. > > .. > > I don't think this rises to the level that Luke is concerned about, > namely a prelude to forcing a common relay policy on all nodes. In > particular I do agree it makes sense that we offer some ways of > customizing policy parameters (eg the mempool size, min relay fee, > etc). Instead, I think the justification for this change is that we > should not support behaviors we think are harmful to the ecosystem > overall and have no legitimate use-case, and we should eliminate ways > that users might inadvertently shoot themselves in the foot. > > - https://github.com/bitcoin/bitcoin/pull/16171#issuecomment-500393271 > > (or see discussion in https://github.com/bitcoin/bitcoin/pull/7219) > > I don't mean to imply the above are saying "there's one way to do > things and it's this way", or that the old way of doing things should > necessarily be the way we keep doing things. Just that previously core > has tended towards designing a single policy that works as well as it > can for everyone and the ecosystem as a whole. (I'm also not saying that > fullrbf can't work well for everyone or the ecosystem as a whole) > > > By contrast, I think the most common response to pushback against the > full rbf option has been along the lines of "it's just an option, we > don't want to force people", eg: > > Blaming the default false -mempoolfullrbf option for a full RBF network > would be holding Bitcoin Core developers responsible for the decisions > of individual node operators and miners. I don't think having the > option (again, default false) can directly cause a full RBF network, > and likewise, I don't think removing this option removes the "risk" > of a full RBF network. > - glozow > https://github.com/bitcoin/bitcoin/pull/26287#issuecomment-1274949400 > > NACK. This is a default false option. > - achow101 > https://github.com/bitcoin/bitcoin/pull/26287#issuecomment-1274953204 > > Erecting artificial barriers to prevent or make it difficult for users > to do what they want to do, is not appropriate behaviour. > - luke-jr > https://github.com/bitcoin/bitcoin/pull/26287#issuecomment-1290721905 > > I'm in general against removing options. > - instagibbs > https://github.com/bitcoin/bitcoin/pull/26287#issuecomment-1292030700 > > I think this differs from what core has done in the past, in that > previously we've tried to ensure a new policy is good for everyone (or as > nearly as it can be), and then enabled it as soon as it's implemented. > Any options that have been added have either been to control resource > usage in ways that don't significantly effect tx propagation, to > allow people to revert to the old behaviour when the new behaviour is > controversial (eg the -mempoolreplacement=0 option from 0.12 to 0.18), > and to make it easier to test/debug the implementation. > > Giving people a new relay behaviour they can opt-in to when we aren't > confident enough to turn on by default doesn't match the approach I've > seen core take in the past. > > > If this is going to be an ongoing shift in how core sees relay/mempool > policy, I think that's significant and worth paying attention to. > > I don't think it's necessary to have that shift to roll out full rbf. > The other approach would be either: > > * set -mempoolfullrbf=true as the default for 24.0, and just have the > command line param there in case people want to do a > "UserRejectedMempoolPolicy" campaign to get everyone to opt-out > > * revert it for now because we don't think mainnet is ready for fullrbf > yet, and introduce it as default true for 25.0 or 26.0 or 27.0 or > to activate at some scheduled date in that timeframe (potentially > backporting it to previous releases to help with adoption too, > whatever). same effect as the previous option, just with a bit more > advanced notice and time to prepare > > I don't think anyone's proposed the first (which I interpret as "most of > us don't think mainnet is ready for fullrbf today"), but the comments > above are all pushback by people arguing against (the first step of) > the second approach, and they seem to be winning the day. > > It's also possible that this is something of a one time thing: full rbf > has been controversial for ages, but widely liked by devs, and other > attempts (eg making it available in knots) haven't actually achieved > much of a result in practice. So maybe this is just a special case and > not a precedent, and when people propose other default false options, > there will be substantially more resistance to them being merged, > despite all the talk about users having options that's going on right now. > > > Assuming it is the change of direction it appears to be -- and all of > the above is really just justification for that assumption -- then like > I said, I think it's worth seriously considering what it means for people > to choose their own relay/mempool policies and for you to expect to have > different mempool policies to many or most of your potential peers. > > > One thing maybe worth noting is that is that you can still only choose > your policy from options that people write code for -- if it wasn't > something you could get by running knots or compiling a rejected PR > yourself, it won't magically become more possible now. Presumably it > would mean that once a PR is written, it might get better review (rather > than being dismissed as not suitable for everyone), and there would be > less maintenance burden than if it had to be manually rebased every > release, though (or at least the maintenance burden would be shared > across everyone working on the codebase). > > > The second thing is that whatever your relay policy is, you still > need a path all the way to miners through nodes that will accept your > transaction at every step. If you're making your mempool more restrictive > (eg -permitbaremultisig=0, -datacarrier=0), that's easy for you (though > you're making life more difficult for people who do create those sorts > of txs); but if you want a more permissive policy (package relay, > version-3-rbf, full-rbf), you might need to do some work. > > The cutoff for that is probably something like "do 30% of listening > nodes have a compatible policy"? If they do, then you'll have about a > 95% chance of having at least one of your outbound peers accept your tx, > just by random chance. If erlay allows increasing your outbound count to > 12 connections instead of 8; that might reduce down to needing just 20% > of listening nodes (~93%). > > But for cases where less than 30% (20%) of network supports your preferred > policy, you probably need to do something cleverer. > > One approach is to set a service bit and preferentially peer with other > nodes that advertise that service bit; knots does the first half of this > for fullrbf, and both halves have been proposed for core in #25600. > Preferential peering was previously done for the segwit deployment, > though in that case it was necessary not just for tx propogation but > also for ensuring block propogation, making it effectively a consensus > critical issue. > > Another approach is having a separate relay network -- eg, lightning nodes > already have a gossip network, and might want to help their own ecosystem > by ensuring unilateral channel closes and justice transactions are quickly > relayed. Using their own gossip network to relay the transaction around, > and each lightning node adding it to their local bitcoind's mempool and > allowing it to propogate (or not) from there as normal, would also be a > way of allowing transactions to propogate well. It does mean that miners > would either need to also participate in lightning gossip directly, or > that miners would need to connect to *many* peers to be confident of > seeing those transactions (eg, if only 2% of the network would see a > tx, you'd need to make 228 connections to have a 99% chance of seeing > the tx). You can't currently do something like this, because all the > relay policies are also applied when adding txs to the mempool via RPC, > and there's no convenient way to remove txs from the mempool. > > A case where something like that might occur is in preventing L2 > transactions from pinning attacks -- so you might have a high-fee, > low-feerate transaction that's been widely propogated, sitting in the > bottom of people's mempools, and you want to replace it with a smaller, > higher-feerate transaction, but don't want to pay a higher absolute fee, > and are thus blocked by BIP 125 rule 3. Perhaps 98% of the network is > unwilling to deviate from BIP 125 rule 3 for you; because that would > make it easy for random griefers to spam their mempool with large txs > then delete them while only paying a small fee; but your L2 peers may be > able to decode your replacement transaction and be sure that you aren't > going to spam them, and thus will happily relay it. > > >From a technical point-of-view, that's largely fine; the downside is it > increases the centralisation pressure on mining: whether that's by having > to connect to substantially more nodes, or having to parse through more > spam, you can't just run your mining operation off a standard install > of bitcoin core anymore, but need to actively opt-in to find all the > weird unusual ways people are sending transactions around in order to > actually collect as much in fees as your competitors are. > > That's probably moderately bad for privacy as well -- if lightning or > coinjoins need special relay rules that most nodes haven't opted into, > it's potentially easy to use that to find the bitcoin nodes on the > network that are participating in those protocols, and from there to > either identify the operator, or run a DoS attack to make it hard for you > to keep doing what you want. Obviously if you're setting a service bit to > get better routing, you've given up that privacy already. Likewise if the > government or random vandals are opposed to bitcoin mining, and miners > have to have special configuration on their nodes that distinguish them > from regular users, then perhaps that makes it easier to find or shut > down their operations. > > There are a few efficiencies to be gained from similar mempool policies as > well: more reliable compact block reconstruction (if you're not missing > any transactions, you avoid a round-trip) and presumably more efficient > set reconstruction with erlay. You'll also waste less bandwidth sending > transactions that the other node is only going to reject. Both those > depend on how many transactions are going to rely on unusual mempool > policies in the first place though. > > ariard wrote: > > I know I've advocated in the past to turn RBF support by default in > the past. Though after gathering a lot of feedbacks, this approach > of offering the policy flexiblity to the interested users only and > favoring a full-rbf gradual deployment sounds better to me. > > - https://github.com/bitcoin/bitcoin/pull/25353#issuecomment-1157137026 > > I guess all the above leads me to think that gradual deployments of > mempool policies are likely the worse approach: even when they're not > hurting anyone, it makes them hard to use during the gradual phase, > and getting around that comes with worrying compromises on privacy and > centralisation; and when they are problematic for some, the indeterminate > nature of a gradual deployment means it's hard to plan for when that > risk is going to eventuate. > > > Theoretically, one way to recover the good parts of core deciding on > what's good for the network might be for people outside of core to > recommend a mempool configuration; then core can just have an option > to make that easy, similar to "-std=c++17" for a C++ compiler, and much > the same as knots' "-corepolicy" option. > > Presuming anyone actually wants to take on that job, and listen to the > concerns of zeroconf businesses, lightning and coinjoin devs, miners, etc; > and can come up with something that keeps most of them happy, and that > 70% or 90% of the network ends up just following those recommendations > because it's easy, it works, and it's recommended by all the apps they > want to use, then that could work great: > > * miners don't need to do anything special, so there's no new > mining centralisation pressure > * miners and users don't reveal what they're doing with bitcoin by the way > they configure their nodes, so there's no privacy problems > * devs can be fairly confident in how they have to design their apps > in order to get their transactions to most hashpower > * devs don't have to add new p2p layers to make it happen > * at least there's someone to talk to when you're trying to figure out > how to make some new project possible when it's inhibited by current > relay policies and you don't have to try to convince everyone to > upgrade on your own > * core devs just provide options, and don't have to worry about being > seen as gatekeepers > > The "downside" in that scenario is that users/dev aren't making much > actual use of all the choices core is offering by making different > options available; but the upside is that that choice is at least readily > available should whoever is coming up with these policy become out of > step with what people actually want. > > One thing that might make an approach like that difficult is that core > has historically been happy to remove options that don't seem useful > anymore: eg the ability to turn of BIP 125 support (#16171), and priority > transactions (#9602). Perhaps that's fine if you're trying to actively > craft a single mempool/relay policy that's good enough for almost everyone > (after all, it makes the code simpler and more efficient, and reduces > the number of footguns); all you're doing is leaving a minority of people > who want weird things to run a fork, and that's going to happen anyway. > > But if people are following policy developed outside of core, core > might well disagree with them and decide "no that's a stupid policy, > no one should do that" and remove some feature that others thing should > continue to be normal. Beyond the examples above, there's already talk of > removing the ability to disable fullrbf support in #26305, for instance. > If that happens, then the people maintaining the policy will instead > end up maintaining an entire fork of bitcoin core, and all we've done > is transition to people running software from a different repo, and a > different set of maintainers. > > If we're really going to a world where core's eager to add new options, > and reluctant to remove them, at least if anyone at all finds them > interesting, that's presumably a non-issue, though. > > Cheers, > aj > > > ------------------------------ > > Subject: Digest Footer > > _______________________________________________ > bitcoin-dev mailing list > bitcoin-dev@lists.linuxfoundation.org > https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev > > > ------------------------------ > > End of bitcoin-dev Digest, Vol 89, Issue 77 > ******************************************* > --0000000000005cda7805ec012908 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Anthony,

=
I took the time to read your whole post. Despite a diploma= tic tone, I find your takeaways from all your references to remain convenie= ntly biased for protecting the plan of RBF via passive aggression.

You show multiple examples where, when I read = them, I assume the next thing you will say will be "so we really shoul= d stop trying to impose optional features, particularly when they affect ex= isting use cases" but instead you persist.

Th= e problem is that RBF has already been an option for years, and anyone that= wants to use it can. Any escalation in Bitcoin Core code to support it mor= e deeply, or by default, is basically an unfair advantage to force the mark= et to do what it already has decided not to.

If wa= llets want to default to RBF, they can already do so, as evidenced by Green= Wallet (which I stopped using because it breaks the UX at Bitrefill).=C2= =A0

Instead of Core devs admitting RBF is a minori= ty use case, you seem to be proposing that the market should now be obligat= ed to prove it can defeat RBF in a stronger form if it really wants to prov= e other use cases. This is oppressive, dark-pattern design. We all know tha= t Core has little ability to sense the market, and the market has little ab= ility to express itself to Core. The idea that the market can always downvo= te or defeat a feature or new complexity proposal is idealistic and unreali= stic.=C2=A0

Superficial features should be de= cided at the surface (app level) not in the protocol or node.

The default answer to ALL proposals is "No." Ch= anges need to win market acceptance, not get special access through Core de= vs baking them deeper and deeper into the protocol and policies until every= one is forced into a new design.=C2=A0

As I mentio= ned before, this behavior, if we are lucky, will result in more mempool typ= es, more implementations, and a more-difficult to modify protocol, but ALL = feature changes, default settings that make decisions for users, and even a= ll scaling changes, are speculative risks with unpredictable outcomes.=C2= =A0

I urge the culture of Core to respect these dy= namics and become much more conservative with proposing change. Please focu= s on efficiencies, bugs, cleanup, reducing overhead, etc.=C2=A0
<= br>
The current RBF movement feels like Core is strong-arming=C2= =A0and shoe-horning in a change that the market is not actually asking for.= It is okay to leave things as they are. It is okay if RBF remains a niche = feature. It is not okay for a small group of RBF-interested engineers to ma= ke commercial Bitcoin use cases worse.=C2=A0

Let u= s realize the Bitcoin we already have. We already have a largely unexplored= canvas of taproot, lightning, UX, etc.=C2=A0

= I expect the things I do with Bitcoin today to work FOREVER.=C2=A0

--
John Carvalho
CEO,=C2=A0Synonym.t= o


=

Date: Thu, 27 Oct 2022 09:52:10 +1000
From: Anthony Towns <aj@erisian.com.au>
To: Bitcoin Protocol Discussion
=C2=A0 =C2=A0 =C2=A0 =C2=A0 <bitcoin-dev@lists.linuxfoundation.org&g= t;
Subject: [bitcoin-dev] On mempool policy consistency
Message-ID: <Y1nIKjQC3DkiSGyw@erisian.com.au>
Content-Type: text/plain; charset=3Dus-ascii

Hi *,

TLDR: Yes, this post is too long, and there's no TLDR. If it's any<= br> consolation, it took longer to write than it does to read?

On Tue, Jun 15, 2021 at 12:55:14PM -0400, Antoine Riard via bitcoin-dev wro= te:
> Subject: Re: [bitcoin-dev] Proposal: Full-RBF in Bitcoin Core 24.0
> I'm writing to propose deprecation of opt-in RBF in favor of full-= RBF

> If there is ecosystem agreement on switching to full-RBF, but 0.24 sou= nds
> too early, let's defer it to 0.25 or 0.26. I don't think Core = has a
> consistent deprecation process w.r.t to policy rules heavily relied-on= by
> Bitcoin users, if we do so let sets a precedent satisfying as many fol= ks as
> we can.

One precedent that seems to be being set here, which to me seems fairly
novel for bitcoin core, is that we're about to start supporting and
encouraging nodes to have meaningfully different mempool policies. From
what I've seen, the baseline expectation has always been that while
certainly mempools can and will differ, policies will be largely the same:<= br>
=C2=A0 Firstly, there is no "the mempool". There is no global mem= pool. Rather
=C2=A0 each node maintains its own mempool and accepts and rejects transact= ion
=C2=A0 to that mempool using their own internal policies. Most nodes have =C2=A0 the same policies, but due to different start times, relay delays, =C2=A0 and other factors, not every node has the same mempool, although the= y
=C2=A0 may be very similar.

=C2=A0 - https://bitcoin.stackexchange.com/questions/98585/how-to-f= ind-if-two-transactions-in-mempool-are-conflicting

Up until now, the differences between node policies supported by different<= br> nodes running core have been quite small, with essentially the following options available:

=C2=A0-minrelaytxfee, -maxmempool - changes the lowest fee rate you'll = accept

=C2=A0-mempoolexpiry - how long to keep txs in the mempool

=C2=A0-datacarrier - reject txs creating OP_RETURN outputs

=C2=A0-datacarriersize - maximum size of OP_RETURN data

=C2=A0-permitbaremultisig - prevent relay of bare multisig

=C2=A0-bytespersigop - changes how SIGOP accounting works for relay and
=C2=A0mining prioritisation

as well as these, marked as "debug only" options (only shown with=
-help-debug):

=C2=A0-incrementalrelayfee - make it easier/harder to spam txs by only
=C2=A0slightly bumping the fee; marked as a "debug only" option
=C2=A0-dustrelayfee - make it easier/harder to create uneconomic utxos;
=C2=A0marked as a "debug only" option

=C2=A0-limit{descendant,ancestor}{count,size} - changes how large the
=C2=A0transaction chains can be; marked as a "debug only" option<= br>
and in theory, but not available on mainnet:

=C2=A0-acceptnonstdtxn - relay/mine non standard transactions

There's also the "prioritisetransaction" rpc, which can cause= you to keep
a low feerate transaction in your mempool longer than you might otherwise.<= br>
I think that -minrelaytxfee, -maxmempool and -mempoolexpiry are the only ones of those options commonly set, and those only rarely result in any
differences in the txs at the top of the mempool.

There are also quite a few parameters that aren't even runtime
configurable:

=C2=A0- MAX_STANDARD_TX_WEIGHT
=C2=A0- MIN_STANDARD_TX_NONWITNESS_SIZE (see also #26265)
=C2=A0- MAX_P2SH_SIGOPS (see also #26348)
=C2=A0- MAX_STANDARD_TX_SIGOPS_COST
=C2=A0- MAX_STANDARD_P2WSH_STACK_ITEMS
=C2=A0- MAX_STANDARD_P2WSH_STACK_ITEM_SIZE
=C2=A0- MAX_STANDARD_TAPSCRIPT_STACK_ITEM_SIZE
=C2=A0- MAX_STANDARD_P2WSH_SCRIPT_SIZE
=C2=A0- MAX_STANDARD_SCRIPTSIG_SIZE
=C2=A0- EXTRA_DESCENDANT_TX_SIZE_LIMIT
=C2=A0- MAX_REPLACEMENT_CANDIDATES

And other plausible options aren't configurable even at compile time -- eg, core doesn't implement BIP 125's inherited signalling rule s= o
there's no way to enable it; core doesn't allow opting out of BIP 1= 25
rule 3 ratchet on absolute fee; core doesn't allow CPFP carveout with more than 1 ancestor; core doesn't allow opting out of LOW_S checks
(even via -acceptnonstdtxn); etc.

We also naturally have different mempool policies between different
releases: eg, expansions of policy, such as allowing OP_RETURN or
expanding it from 40 to 80 bytes or new soft forks where old nodes won'= t
relay transactions that use the new; and also occassional restrictions
in policy, such as the LOW_S requirement.


While supporting and encouraging different mempool polices might be new
for core, it's not new for knots: knots changes some of these defaults<= br> (-permitbaremultisig defaults to false, -datacarriersize is reduced to
42), allows the use of -acceptnonstdtxn on mainnet, and introduces new
options including -spkreuse and -mempoolreplacement (giving the latter
full rbf behaviour by default). Knots also includes a `-corepolicy`
option to make it easy to get a configuration matching core's defaults.=


I think gmaxwell's take from Feb 2015 (in the context of how restrictiv= e
policy on OP_RETURN data should be) was a reasonable description for
core's approach up until now:

=C2=A0 There is also a matter of driving competent design rather than lazy<= br> =C2=A0 first thing that works. E.g. In stealth addresses the early proposal= s
=C2=A0 use highly inefficient single ECDH point per output instead of simpl= y
=C2=A0 pooling them. Network behavior is one of the few bits of friction =C2=A0 driving good technical design rather than "move fast, break thi= ngs, and
=C2=A0 force everyone else onto my way of doing thing rather than discussin= g
=C2=A0 the design in public". No one wants to be an outright gatekeepe= r,
=C2=A0 but the network is a shared resource and it's perfectly reasonab= le
=C2=A0 node behavior to be stingy about the perpetual storage impact of the=
=C2=A0 transactions they're willing to process, especially when it come= s to
=C2=A0 neutral technical criteria like the amount of network irrelevant dat= a
=C2=A0 stuffed in transactions.

=C2=A0 There is also a very clear pattern we've seen in the past where<= br> =C2=A0 people take anything the system lets them do as strong evidence that=
=C2=A0 they have a irrevocable right to use the system in that way, and tha= t
=C2=A0 their only responsibility-- and if their usage harms the system it&#= 39;s
=C2=A0 the responsibility of the system to not permit it. [...
=C2=A0 ...] For mitigating these risks it's optimal if transactions
=C2=A0 seem as uniform and indistinguishable as reasonably possible.

=C2=A0 - https://github.com/bitcoi= n/bitcoin/pull/5286#issuecomment-72564175

Perhaps see also sdaftuar in Nov 2015,

=C2=A0 To me the most important question is, is priority something that min= ers
=C2=A0 want to use?

=C2=A0 If a non-negligible amount of hashpower intends to use it in their =C2=A0 transaction selection, then I think it makes sense for nodes to use = it
=C2=A0 too, because it's generally helpful to have your mempool predict= the
=C2=A0 UTXO as much as possible, and for nodes to be able to have reasonabl= e
=C2=A0 fee and priority estimates (which won't happen unless they track= the
=C2=A0 priority transactions somehow -- I'm presuming that miners run w= ith
=C2=A0 much bigger mempools than regular nodes).

=C2=A0 If the answer is no, then that's fine and I don't see a reas= on to push
=C2=A0 in this direction. I sort of assumed there was enough hashpower mini= ng
=C2=A0 with priority, since last time I checked estimatepriority was still<= br> =C2=A0 giving meaningful results for low-ish blockheights, but I haven'= t done
=C2=A0 any kind of real analysis.

=C2=A0 - https://github.com/bitco= in/bitcoin/pull/6992#issuecomment-155969455

or in June 2019,

=C2=A0 What this PR is proposing is to get rid of a command-line option tha= t is
=C2=A0 (a) a footgun for users and (b) does not reflect what I believe to b= e
=C2=A0 the understanding most users have, which is that [X txs] are expecte= d
=C2=A0 to propagate well on the network.

=C2=A0 ..

=C2=A0 I don't think this rises to the level that Luke is concerned abo= ut,
=C2=A0 namely a prelude to forcing a common relay policy on all nodes. In =C2=A0 particular I do agree it makes sense that we offer some ways of
=C2=A0 customizing policy parameters (eg the mempool size, min relay fee, =C2=A0 etc). Instead, I think the justification for this change is that we<= br> =C2=A0 should not support behaviors we think are harmful to the ecosystem =C2=A0 overall and have no legitimate use-case, and we should eliminate way= s
=C2=A0 that users might inadvertently shoot themselves in the foot.

=C2=A0 - https://github.com/bitc= oin/bitcoin/pull/16171#issuecomment-500393271

(or see discussion in https://github.com/bitcoin/bitcoin= /pull/7219)

I don't mean to imply the above are saying "there's one way to= do
things and it's this way", or that the old way of doing things sho= uld
necessarily be the way we keep doing things. Just that previously core
has tended towards designing a single policy that works as well as it
can for everyone and the ecosystem as a whole. (I'm also not saying tha= t
fullrbf can't work well for everyone or the ecosystem as a whole)


By contrast, I think the most common response to pushback against the
full rbf option has been along the lines of "it's just an option, = we
don't want to force people", eg:

=C2=A0 Blaming the default false -mempoolfullrbf option for a full RBF netw= ork
=C2=A0 would be holding Bitcoin Core developers responsible for the decisio= ns
=C2=A0 of individual node operators and miners. I don't think having th= e
=C2=A0 option (again, default false) can directly cause a full RBF network,=
=C2=A0 and likewise, I don't think removing this option removes the &qu= ot;risk"
=C2=A0 of a full RBF network.
=C2=A0 =C2=A0- glozow
=C2=A0 =C2=A0 =C2=A0https://git= hub.com/bitcoin/bitcoin/pull/26287#issuecomment-1274949400

=C2=A0 NACK. This is a default false option.
=C2=A0 =C2=A0- achow101
=C2=A0 =C2=A0 =C2=A0https://git= hub.com/bitcoin/bitcoin/pull/26287#issuecomment-1274953204

=C2=A0 Erecting artificial barriers to prevent or make it difficult for use= rs
=C2=A0 to do what they want to do, is not appropriate behaviour.
=C2=A0 =C2=A0- luke-jr
=C2=A0 =C2=A0 =C2=A0https://git= hub.com/bitcoin/bitcoin/pull/26287#issuecomment-1290721905

=C2=A0 I'm in general against removing options.
=C2=A0 =C2=A0- instagibbs
=C2=A0 =C2=A0 =C2=A0https://git= hub.com/bitcoin/bitcoin/pull/26287#issuecomment-1292030700

I think this differs from what core has done in the past, in that
previously we've tried to ensure a new policy is good for everyone (or = as
nearly as it can be), and then enabled it as soon as it's implemented.<= br> Any options that have been added have either been to control resource
usage in ways that don't significantly effect tx propagation, to
allow people to revert to the old behaviour when the new behaviour is
controversial (eg the -mempoolreplacement=3D0 option from 0.12 to 0.18), and to make it easier to test/debug the implementation.

Giving people a new relay behaviour they can opt-in to when we aren't confident enough to turn on by default doesn't match the approach I'= ;ve
seen core take in the past.


If this is going to be an ongoing shift in how core sees relay/mempool
policy, I think that's significant and worth paying attention to.

I don't think it's necessary to have that shift to roll out full rb= f.
The other approach would be either:

=C2=A0* set -mempoolfullrbf=3Dtrue as the default for 24.0, and just have t= he
=C2=A0 =C2=A0command line param there in case people want to do a
=C2=A0 =C2=A0"UserRejectedMempoolPolicy" campaign to get everyone= to opt-out

=C2=A0* revert it for now because we don't think mainnet is ready for f= ullrbf
=C2=A0 =C2=A0yet, and introduce it as default true for 25.0 or 26.0 or 27.0= or
=C2=A0 =C2=A0to activate at some scheduled date in that timeframe (potentia= lly
=C2=A0 =C2=A0backporting it to previous releases to help with adoption too,=
=C2=A0 =C2=A0whatever). same effect as the previous option, just with a bit= more
=C2=A0 =C2=A0advanced notice and time to prepare

I don't think anyone's proposed the first (which I interpret as &qu= ot;most of
us don't think mainnet is ready for fullrbf today"), but the comme= nts
above are all pushback by people arguing against (the first step of)
the second approach, and they seem to be winning the day.

It's also possible that this is something of a one time thing: full rbf=
has been controversial for ages, but widely liked by devs, and other
attempts (eg making it available in knots) haven't actually achieved much of a result in practice. So maybe this is just a special case and
not a precedent, and when people propose other default false options,
there will be substantially more resistance to them being merged,
despite all the talk about users having options that's going on right n= ow.


Assuming it is the change of direction it appears to be -- and all of
the above is really just justification for that assumption -- then like
I said, I think it's worth seriously considering what it means for peop= le
to choose their own relay/mempool policies and for you to expect to have different mempool policies to many or most of your potential peers.


One thing maybe worth noting is that is that you can still only choose
your policy from options that people write code for -- if it wasn't
something you could get by running knots or compiling a rejected PR
yourself, it won't magically become more possible now.=C2=A0 Presumably= it
would mean that once a PR is written, it might get better review (rather than being dismissed as not suitable for everyone), and there would be
less maintenance burden than if it had to be manually rebased every
release, though (or at least the maintenance burden would be shared
across everyone working on the codebase).


The second thing is that whatever your relay policy is, you still
need a path all the way to miners through nodes that will accept your
transaction at every step. If you're making your mempool more restricti= ve
(eg -permitbaremultisig=3D0, -datacarrier=3D0), that's easy for you (th= ough
you're making life more difficult for people who do create those sorts<= br> of txs); but if you want a more permissive policy (package relay,
version-3-rbf, full-rbf), you might need to do some work.

The cutoff for that is probably something like "do 30% of listening nodes have a compatible policy"? If they do, then you'll have abou= t a
95% chance of having at least one of your outbound peers accept your tx, just by random chance. If erlay allows increasing your outbound count to 12 connections instead of 8; that might reduce down to needing just 20%
of listening nodes (~93%).

But for cases where less than 30% (20%) of network supports your preferred<= br> policy, you probably need to do something cleverer.

One approach is to set a service bit and preferentially peer with other
nodes that advertise that service bit; knots does the first half of this for fullrbf, and both halves have been proposed for core in #25600.
Preferential peering was previously done for the segwit deployment,
though in that case it was necessary not just for tx propogation but
also for ensuring block propogation, making it effectively a consensus
critical issue.

Another approach is having a separate relay network -- eg, lightning nodes<= br> already have a gossip network, and might want to help their own ecosystem by ensuring unilateral channel closes and justice transactions are quickly<= br> relayed. Using their own gossip network to relay the transaction around, and each lightning node adding it to their local bitcoind's mempool and=
allowing it to propogate (or not) from there as normal, would also be a
way of allowing transactions to propogate well. It does mean that miners would either need to also participate in lightning gossip directly, or
that miners would need to connect to *many* peers to be confident of
seeing those transactions (eg, if only 2% of the network would see a
tx, you'd need to make 228 connections to have a 99% chance of seeing the tx). You can't currently do something like this, because all the relay policies are also applied when adding txs to the mempool via RPC,
and there's no convenient way to remove txs from the mempool.

A case where something like that might occur is in preventing L2
transactions from pinning attacks -- so you might have a high-fee,
low-feerate transaction that's been widely propogated, sitting in the bottom of people's mempools, and you want to replace it with a smaller,=
higher-feerate transaction, but don't want to pay a higher absolute fee= ,
and are thus blocked by BIP 125 rule 3. Perhaps 98% of the network is
unwilling to deviate from BIP 125 rule 3 for you; because that would
make it easy for random griefers to spam their mempool with large txs
then delete them while only paying a small fee; but your L2 peers may be able to decode your replacement transaction and be sure that you aren't=
going to spam them, and thus will happily relay it.

>From a technical point-of-view, that's largely fine; the downside i= s it
increases the centralisation pressure on mining: whether that's by havi= ng
to connect to substantially more nodes, or having to parse through more
spam, you can't just run your mining operation off a standard install of bitcoin core anymore, but need to actively opt-in to find all the
weird unusual ways people are sending transactions around in order to
actually collect as much in fees as your competitors are.

That's probably moderately bad for privacy as well -- if lightning or coinjoins need special relay rules that most nodes haven't opted into,<= br> it's potentially easy to use that to find the bitcoin nodes on the
network that are participating in those protocols, and from there to
either identify the operator, or run a DoS attack to make it hard for you to keep doing what you want. Obviously if you're setting a service bit = to
get better routing, you've given up that privacy already. Likewise if t= he
government or random vandals are opposed to bitcoin mining, and miners
have to have special configuration on their nodes that distinguish them
from regular users, then perhaps that makes it easier to find or shut
down their operations.

There are a few efficiencies to be gained from similar mempool policies as<= br> well: more reliable compact block reconstruction (if you're not missing=
any transactions, you avoid a round-trip) and presumably more efficient
set reconstruction with erlay. You'll also waste less bandwidth sending=
transactions that the other node is only going to reject. Both those
depend on how many transactions are going to rely on unusual mempool
policies in the first place though.

ariard wrote:

=C2=A0 I know I've advocated in the past to turn RBF support by default= in
=C2=A0 the past. Though after gathering a lot of feedbacks, this approach =C2=A0 of offering the policy flexiblity to the interested users only and =C2=A0 favoring a full-rbf gradual deployment sounds better to me.

=C2=A0 - https://github.com/bit= coin/bitcoin/pull/25353#issuecomment-1157137026

I guess all the above leads me to think that gradual deployments of
mempool policies are likely the worse approach: even when they're not hurting anyone, it makes them hard to use during the gradual phase,
and getting around that comes with worrying compromises on privacy and
centralisation; and when they are problematic for some, the indeterminate nature of a gradual deployment means it's hard to plan for when that risk is going to eventuate.


Theoretically, one way to recover the good parts of core deciding on
what's good for the network might be for people outside of core to
recommend a mempool configuration; then core can just have an option
to make that easy, similar to "-std=3Dc++17" for a C++ compiler, = and much
the same as knots' "-corepolicy" option.

Presuming anyone actually wants to take on that job, and listen to the
concerns of zeroconf businesses, lightning and coinjoin devs, miners, etc;<= br> and can come up with something that keeps most of them happy, and that
70% or 90% of the network ends up just following those recommendations
because it's easy, it works, and it's recommended by all the apps t= hey
want to use, then that could work great:

=C2=A0* miners don't need to do anything special, so there's no new=
=C2=A0 =C2=A0mining centralisation pressure
=C2=A0* miners and users don't reveal what they're doing with bitco= in by the way
=C2=A0 =C2=A0they configure their nodes, so there's no privacy problems=
=C2=A0* devs can be fairly confident in how they have to design their apps<= br> =C2=A0 =C2=A0in order to get their transactions to most hashpower
=C2=A0* devs don't have to add new p2p layers to make it happen
=C2=A0* at least there's someone to talk to when you're trying to f= igure out
=C2=A0 =C2=A0how to make some new project possible when it's inhibited = by current
=C2=A0 =C2=A0relay policies and you don't have to try to convince every= one to
=C2=A0 =C2=A0upgrade on your own
=C2=A0* core devs just provide options, and don't have to worry about b= eing
=C2=A0 =C2=A0seen as gatekeepers

The "downside" in that scenario is that users/dev aren't maki= ng much
actual use of all the choices core is offering by making different
options available; but the upside is that that choice is at least readily available should whoever is coming up with these policy become out of
step with what people actually want.

One thing that might make an approach like that difficult is that core
has historically been happy to remove options that don't seem useful anymore: eg the ability to turn of BIP 125 support (#16171), and priority transactions (#9602). Perhaps that's fine if you're trying to activ= ely
craft a single mempool/relay policy that's good enough for almost every= one
(after all, it makes the code simpler and more efficient, and reduces
the number of footguns); all you're doing is leaving a minority of peop= le
who want weird things to run a fork, and that's going to happen anyway.=

But if people are following policy developed outside of core, core
might well disagree with them and decide "no that's a stupid polic= y,
no one should do that" and remove some feature that others thing shoul= d
continue to be normal. Beyond the examples above, there's already talk = of
removing the ability to disable fullrbf support in #26305, for instance. If that happens, then the people maintaining the policy will instead
end up maintaining an entire fork of bitcoin core, and all we've done is transition to people running software from a different repo, and a
different set of maintainers.

If we're really going to a world where core's eager to add new opti= ons,
and reluctant to remove them, at least if anyone at all finds them
interesting, that's presumably a non-issue, though.

Cheers,
aj


------------------------------

Subject: Digest Footer

_______________________________________________
bitcoin-dev mailing list
= bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mail= man/listinfo/bitcoin-dev


------------------------------

End of bitcoin-dev Digest, Vol 89, Issue 77
*******************************************
--0000000000005cda7805ec012908--