1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
|
Return-Path: <antoine.riard@gmail.com>
Received: from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])
by lists.linuxfoundation.org (Postfix) with ESMTP id 3251FC000B
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 15 Feb 2022 00:43:41 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
by smtp4.osuosl.org (Postfix) with ESMTP id 28D4840909
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 15 Feb 2022 00:43:41 +0000 (UTC)
X-Virus-Scanned: amavisd-new at osuosl.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5
tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001,
HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,
SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: smtp4.osuosl.org (amavisd-new);
dkim=pass (2048-bit key) header.d=gmail.com
Received: from smtp4.osuosl.org ([127.0.0.1])
by localhost (smtp4.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id NKAdq2ZBa9VL
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 15 Feb 2022 00:43:39 +0000 (UTC)
X-Greylist: whitelisted by SQLgrey-1.8.0
Received: from mail-yb1-xb2e.google.com (mail-yb1-xb2e.google.com
[IPv6:2607:f8b0:4864:20::b2e])
by smtp4.osuosl.org (Postfix) with ESMTPS id 7A89C40910
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 15 Feb 2022 00:43:39 +0000 (UTC)
Received: by mail-yb1-xb2e.google.com with SMTP id bt13so51381447ybb.2
for <bitcoin-dev@lists.linuxfoundation.org>;
Mon, 14 Feb 2022 16:43:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
h=mime-version:references:in-reply-to:from:date:message-id:subject:to
:cc; bh=l8FjjHMaj5UvP/rZzLqEweCz9d2/rdQ0DHhiBa/WOFw=;
b=D+Z2boRlRoN9e+swLo4JmyV6XSzqFU1eIFyLjbac+IJpW+ckD1t7ABvUmpBDNyMYjr
sTdHSjDSZRdPRxRulXDJ/dtdWcKM5VtBHzDdChtv/r98FHlcFejGbKvSfnaYMt1lOZME
q/FN+OGfOHpPUYewmu72Kt6OB+B3NMSlrjYfm7ud83ZnIEAxPnSt8Dx7XKx5TRmua30e
swluVFcKq2dVhHU0h6LrJfcjR05Y0xYcv8AabUHZAsKe/nJ/PWQvy7R5Bb/nMg7WYgxV
ZvRWej2+tJPotAY0kmnBhGDdHpaBSNHr8O+jWUYU3s3p6pBZQjitG0xs2k4kp+Nczsaq
Pt6A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20210112;
h=x-gm-message-state:mime-version:references:in-reply-to:from:date
:message-id:subject:to:cc;
bh=l8FjjHMaj5UvP/rZzLqEweCz9d2/rdQ0DHhiBa/WOFw=;
b=oZU9QLujd9hSyIPvithlsXW8offeNdGxHX/rEfvnbThbFR0ZP+vicp2hQYsY/Ax/TT
x0CcTanlTp9DQk9bo9bJI+LM/JBzjWkMpEAPa3OqKsncW2KNjuUNfXD+9LljAP04Gfag
5AHC9GtoaBlCuPUzlaCLldz/4wsbMDiRdOMPZbBld6NH30CslfVWf9Jpgy6V4JY9rpyS
f1om6Omn96jkpgM0nJy+FT5tmTId9YZTdGiYEq1kzpmaCbQt/IS5JiF0vZEWJ45fI2bc
y0FiKG/FrmIxL2PIWN3c2FFYm2Z0I8iur9xQc2PW037Zgpi8D0Y6e+DB0A+BlJLvV5td
0suw==
X-Gm-Message-State: AOAM533afsao721rrqGm3BumrYdNqMqRNJ37qnNX2jK57khdYBXqKAj8
VnUhEHFBR0PxSPLxoowK8Cp7Js4UpR7r0EN3GEZBfJaBCEs=
X-Google-Smtp-Source: ABdhPJwpt9K2U5lygckOOgTP5DZY2pWMXjlBvjaM/3D/QrI6h46HG730UjpSMMBtGUZFighl9fl0jmsEudmDliaOb+U=
X-Received: by 2002:a81:b502:: with SMTP id t2mr1426679ywh.460.1644885818254;
Mon, 14 Feb 2022 16:43:38 -0800 (PST)
MIME-Version: 1.0
References: <CAPfvXfKrnju1fzxOKs3Fx00NOPWHjedF7e4xMSGs8buwc0O2kw@mail.gmail.com>
<CALZpt+FwZTXEYYiJ=1XTXbDVECW41e9rNq8rn8AYr6m3yLAkPA@mail.gmail.com>
<CAPfvXfJN9zeJDYka8BycU102xGdwQ2O9=Khgjag-eYLmXRdsdA@mail.gmail.com>
In-Reply-To: <CAPfvXfJN9zeJDYka8BycU102xGdwQ2O9=Khgjag-eYLmXRdsdA@mail.gmail.com>
From: Antoine Riard <antoine.riard@gmail.com>
Date: Mon, 14 Feb 2022 19:43:26 -0500
Message-ID: <CALZpt+G0uXL04onty2N++6tWeX7Y=5KWw3x8-A0MvyUgZR-4Xw@mail.gmail.com>
To: "James O'Beirne" <james.obeirne@gmail.com>
Content-Type: multipart/alternative; boundary="000000000000e4a84a05d803d203"
X-Mailman-Approved-At: Tue, 15 Feb 2022 01:09:36 +0000
Cc: Bitcoin Protocol Discussion <bitcoin-dev@lists.linuxfoundation.org>
Subject: Re: [bitcoin-dev] Thoughts on fee bumping
X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>,
<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>,
<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Feb 2022 00:43:41 -0000
--000000000000e4a84a05d803d203
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
> In the context of fee bumping, I don't see how this is a criticism
> unique to transaction sponsors, since it also applies to CPFP: if you
> tried to bump fees for transaction A with child txn B, if some mempool
> hasn't seen parent A, it will reject B.
Agree, it's a comment raising the shenanigans of tx-diff-only propagation,
afaict affecting equally all fee-bumping primitives. It wasn't a criticism
specific to transaction sponsors, as at that point of your post, sponsors
are not introduced yet.
> This still doesn't address the issue I'm talking about, which is if you
> pre-commit to some "fee-bumping" key in your CPFP outputs and that key
> ends up being compromised. This isn't a matter of data availability or
> redundancy.
I'm not sure about the real safety risk of the compromise of the anchor
output key. Of course, if your anchor output key is compromised and the
bumped package is already public/known, an attacker can extend your package
with junk to neutralize your carve-out capability (I think). That said,
this issue sounds solved to me with package relay, as you can always
broadcast a new version of the package from the root UTXO, without
attention to the carve-out limitation.
(Side-note: I think we can slowly deprecate the carve-out once package
relay is deployed, as the fee-bumping flexibility of the latter is a
superset of the former).
> As I mentioned in the reply to Matt's message, I'm not quite
> understanding this idea of wanting to bump the fee for something
> without knowing what it is; that doesn't make much sense to me.
> The "bump fee" operation seems contingent on knowing
> what you want to bump.
From your post : "No rebroadcast (wasted bandwidth) is required for the
original txn data."
I'm objecting to that supposed benefit of a transaction sponsor. If you
have transaction X and transaction Y spending the same UTXO, both of them
can be defined as "the original txn data". If you wish to fee-bump
transaction X with sponsor, how can you be sure that transaction
Y isn't present in the majority of network nodes, and X has _not_ been
dropped since your last broadcast ? Otherwise iirc sponsor design, your
sponsor transaction is going to be rejected.
I think you can't, and thus preventively you should broadcast as a (new
type) of package the sponsoring/sponsored transaction.
That said, I'm not sure if that issue is equally affecting vaults than
payment channels. With vaults, the tree of transactions is known ahead,
and there is no competition in the spends. Assuming the first broadcast has
been efficient (and it could be a reasonable assumption thanks to mempool
rebroadcast), the sponsor should propagate.
So I think here for the sake of sponsor efficiency analysis, we might have
to class between the protocol with once-for-all-transaction-negotiation
(vaults) and the ones with off-chain, dynamic re-negotiation (payment
channels, factories) ?
> I'm not familiar with the L2 dust-limit issues, and I do think that
> "fixing" RBF behavior is *probably* worthwhile.
Sadly, it sounds that "fixing" RBF behavior is a requirement to eradicate
the most advanced pinnings... That fix is independent of the fee-bumping
primitive considered.
> Those issues aside, I
> think the transaction sponsors idea may be closer to a silver bullet
> than you're giving it credit for, because designing specifically for the
> fee-management use case has some big benefits.
I don't deny the scheme is interesting, though I would argue SIGHASH_GROUP
is more efficient, while offering more flexibility. In any case, I think we
should still pursue further the collections of problems and requirements
(batching, key management, ...) that new fee-bumping primitives should aim
to solve, before engaging more on the deployment of one of them [0].
[0] In that sense see
https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/019031.htm=
l
Le lun. 14 f=C3=A9vr. 2022 =C3=A0 15:29, James O'Beirne <james.obeirne@gmai=
l.com> a
=C3=A9crit :
> Thanks for your thoughtful reply Antoine.
>
> > In a distributed system such as the Bitcoin p2p network, you might
> > have transaction A and transaction B broadcast at the same time and
> > your peer topology might fluctuate between original send and
> > broadcast of the diff, you don't know who's seen what... You might
> > inefficiently announce diff A on top of B and diff B on top A. We
> > might leverage set reconciliation there a la Erlay, though likely
> > with increased round-trips.
>
> In the context of fee bumping, I don't see how this is a criticism
> unique to transaction sponsors, since it also applies to CPFP: if you
> tried to bump fees for transaction A with child txn B, if some mempool
> hasn't seen parent A, it will reject B.
>
> > Have you heard about SIGHASH_GROUP [0] ?
>
> I haven't - I'll spend some time reviewing this. Thanks.
>
> > > [me complaining CPFP requires lock-in to keys]
> >
> > It's true it requires to pre-specify the fee-bumping key. Though note
> > the fee-bumping key can be fully separated from the
> > "vaults"/"channels" set of main keys and hosted on replicated
> > infrastructure such as watchtowers.
>
> This still doesn't address the issue I'm talking about, which is if you
> pre-commit to some "fee-bumping" key in your CPFP outputs and that key
> ends up being compromised. This isn't a matter of data availability or
> redundancy.
>
> Note that this failure may be unique to vault use cases, when you're
> pre-generating potentially large numbers of transactions or covenants
> that cannot be altered after the fact. If you generate vault txns that
> assume the use of some key for CPFP-based fee bumping and that key
> winds up being compromised, that puts you in a an uncomfortable
> situation: you can no longer bump fees on unvaulting transactions,
> rendering the vaults possibly unretrievable depending on the fee market.
>
> > As a L2 transaction issuer you can't be sure the transaction you wish
> > to point to is already in the mempool, or have not been replaced by
> > your counterparty spending the same shared-utxo, either competitively
> > or maliciously. So as a measure of caution, you should broadcast
> > sponsor + target transactions in the same package, thus cancelling
> > the bandwidth saving (I think).
>
> As I mentioned in the reply to Matt's message, I'm not quite
> understanding this idea of wanting to bump the fee for something
> without knowing what it is; that doesn't make much sense to me.
> The "bump fee" operation seems contingent on knowing
> what you want to bump.
>
> And if you're, say, trying to broadcast a lightning channel close and
> you know you need to bump the fee right away, before even broadcasting
> it, either you're going to
>
> - reformulate the txn to bring up the fee rate (e.g. add inputs
> with some yet-undeployed sighash) as you would have done with RBF, or
>
> - you'd have the same "package relay" problem with CPFP that you
> would with transaction sponsors.
>
> So I don't understand the objection here.
>
> Also, I didn't mean to discourage existing work on package relay or
> fixing RBF, which seem clearly important. Maybe I should have noted
> that explicitly in the original message
>
> > I don't think a sponsor is a silver-bullet to solve all the
> > L2-related mempool issues. It won't solve the most concerning pinning
> > attacks, as I think the bottleneck is replace-by-fee. Neither solve
> > the issues encumbered by the L2s by the dust limit.
>
> I'm not familiar with the L2 dust-limit issues, and I do think that
> "fixing" RBF behavior is *probably* worthwhile. Those issues aside, I
> think the transaction sponsors idea may be closer to a silver bullet
> than you're giving it credit for, because designing specifically for the
> fee-management use case has some big benefits.
>
> For one, it makes migration easier. That is to say: there is none,
> whereas there is existing RBF policy that needs consideration.
>
> But maybe more importantly, transaction sponsors' limited use case also
> allows for specifying much more targeted "replacement" policy since
> sponsors are special-purpose transactions that only exist to
> dynamically bump feerate. E.g. my SIGHASH_{NONE,SINGLE}|ANYONECANPAY
> proposal might make complete sense for the sponsors/fee-management use
> case, and clarify the replacement problem, but obviously wouldn't work
> for more general transaction replacement. In other words, RBF's
> general nature might make it a much harder problem to solve well.
>
--000000000000e4a84a05d803d203
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
<div dir=3D"ltr">> In the context of fee bumping, I don't see how th=
is is a criticism<br>> unique to transaction sponsors, since it also app=
lies to CPFP: if you<br>> tried to bump fees for transaction A with chil=
d txn B, if some mempool<br>> hasn't seen parent A, it will reject B=
.<br><br>Agree, it's a comment raising the shenanigans of tx-diff-only =
propagation, afaict affecting equally all fee-bumping primitives. It wasn&#=
39;t a criticism specific to transaction sponsors, as at that point of your=
post, sponsors are not introduced yet.<br><br>> This still doesn't =
address the issue I'm talking about, which is if you<br>> pre-commit=
to some "fee-bumping" key in your CPFP outputs and that key<br>&=
gt; ends up being compromised. This isn't a matter of data availability=
or<br>> redundancy.<br><br>I'm not sure about the real safety risk =
of the compromise of the anchor output key. Of course, if your anchor outpu=
t key is compromised and the bumped package is already public/known, an att=
acker can extend your package with junk to neutralize your carve-out capabi=
lity (I think). That said, this issue sounds solved to me with package rela=
y, as you can always broadcast a new version of the package from the root U=
TXO, without attention to the carve-out limitation.<br><br>(Side-note: I th=
ink we can slowly deprecate the carve-out once package relay is deployed, a=
s the fee-bumping flexibility of the latter is a superset of the former).<b=
r><br>> As I mentioned in the reply to Matt's message, I'm not q=
uite<br>> understanding this idea of wanting to bump the fee for somethi=
ng<br>> without knowing what it is; that doesn't make much sense to =
me.<br>> The "bump fee" operation seems contingent on knowing<=
br>> what you want to bump.<br><br>From your post : "No rebroadcast=
(wasted bandwidth) is required for the original txn data." <br><br>I&=
#39;m objecting to that supposed benefit of a transaction sponsor. If you h=
ave transaction X and transaction Y spending the same UTXO, both of them ca=
n be defined as "the original txn data". If you wish to fee-bump =
transaction X with sponsor, how can you be sure that transaction<br>Y isn&#=
39;t present in the majority of network nodes, and X has _not_ been dropped=
since your last broadcast ? Otherwise iirc sponsor design, your sponsor tr=
ansaction is going to be rejected.<br><br>I think you can't, and thus p=
reventively you should broadcast as a (new type) of package the sponsoring/=
sponsored transaction.<br><br>That said, I'm not sure if that issue is =
equally affecting vaults than payment channels. With vaults, the tree of tr=
ansactions is =C2=A0known ahead, and there is no competition in the spends.=
Assuming the first broadcast has been efficient (and it could be a reasona=
ble assumption thanks to mempool<br>rebroadcast), the sponsor should propag=
ate.<br><br>So I think here for the sake of sponsor efficiency analysis, we=
might have to class between the protocol with once-for-all-transaction-neg=
otiation (vaults) and the ones with off-chain, dynamic re-negotiation (paym=
ent channels, factories) ?<br><br>> I'm not familiar with the L2 dus=
t-limit issues, and I do think that<br>> "fixing" RBF behavior=
is *probably* worthwhile.<br><br>Sadly, it sounds that "fixing" =
RBF behavior is a requirement to eradicate the most advanced pinnings... Th=
at fix is independent of the fee-bumping primitive considered.<br><br>> =
=C2=A0Those issues aside, I<br>> think the transaction sponsors idea may=
be closer to a silver bullet<br>> than you're giving it credit for,=
because designing specifically for the<br>> fee-management use case has=
some big benefits.<br><br>I don't deny the scheme is interesting, thou=
gh I would argue SIGHASH_GROUP is more efficient, while offering more flexi=
bility. In any case, I think we should still pursue further the collections=
of problems and requirements (batching, key management, ...) that new fee-=
bumping primitives should aim to solve, before engaging more on the deploym=
ent of one of them [0].<br><br>[0] In that sense see <a href=3D"https://lis=
ts.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/019031.html">https://=
lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-May/019031.html</a><br=
></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr"=
>Le=C2=A0lun. 14 f=C3=A9vr. 2022 =C3=A0=C2=A015:29, James O'Beirne <=
<a href=3D"mailto:james.obeirne@gmail.com">james.obeirne@gmail.com</a>> =
a =C3=A9crit=C2=A0:<br></div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1=
ex"><div dir=3D"ltr">Thanks for your thoughtful reply Antoine.<br><br>> =
In a distributed system such as the Bitcoin p2p network, you might<br>> =
have transaction A and transaction B =C2=A0broadcast at the same time and<b=
r>> your peer topology might fluctuate between original send and<br>>=
broadcast of the diff, you don't know who's seen what... You might=
<br>> inefficiently announce diff A on top of B and diff B on top A. We<=
br>> might leverage set reconciliation there a la Erlay, though likely<b=
r>> with increased round-trips.<br><br>In the context of fee bumping, I =
don't see how this is a criticism<br>unique to transaction sponsors, si=
nce it also applies to CPFP: if you<br>tried to bump fees for transaction A=
with child txn B, if some mempool<br>hasn't seen parent A, it will rej=
ect B. <br><br>> Have you heard about SIGHASH_GROUP [0] ? <br><br>I have=
n't - I'll spend some time reviewing this. Thanks.<br><div><br></di=
v><div>> > [me complaining CPFP requires lock-in to keys]</div><div>&=
gt;<br></div>> It's true it requires to pre-specify the fee-bumping =
key. Though note<br>> the fee-bumping key can be fully separated from th=
e<br>> "vaults"/"channels" set of main keys and host=
ed on replicated<br>> infrastructure such as watchtowers.<br><br>This st=
ill doesn't address the issue I'm talking about, which is if you<br=
>pre-commit to some "fee-bumping" key in your CPFP outputs and th=
at key<br>ends up being compromised. This isn't a matter of data availa=
bility or<br>redundancy. <br><br>Note that this failure may be unique to va=
ult use cases, when you're<br>pre-generating potentially large numbers =
of transactions or covenants<br>that cannot be altered after the fact. If y=
ou generate vault txns that<br>assume the use of some key for CPFP-based fe=
e bumping and that key<br>winds up being compromised, that puts you in a an=
uncomfortable<br>situation: you can no longer bump fees on unvaulting tran=
sactions,<br>rendering the vaults possibly unretrievable depending on the f=
ee market.<br><br>> As a L2 transaction issuer you can't be sure the=
transaction you wish<br>> to point to is already in the mempool, or hav=
e not been replaced by<br>> your counterparty spending the same shared-u=
txo, either competitively<br>> or maliciously. So as a measure of cautio=
n, you should broadcast<br>> sponsor + target transactions in the same p=
ackage, thus cancelling<br>> the bandwidth saving (I think).<br><br>As I=
mentioned in the reply to Matt's message, I'm not quite<br>underst=
anding this idea of wanting to bump the fee for something<br><div>without k=
nowing what it is; that doesn't make much sense to me. <br></div><div>T=
he "bump fee" operation seems contingent on knowing<br></div><div=
>what you want to bump.<br></div><br>And if you're, say, trying to broa=
dcast a lightning channel close and<br>you know you need to bump the fee ri=
ght away, before even broadcasting<br>it, either you're going to<br><br=
>- reformulate the txn to bring up the fee rate (e.g. add inputs<br>=C2=A0 =
with some yet-undeployed sighash) as you would have done with RBF, or<br><b=
r>- you'd have the same "package relay" problem with CPFP tha=
t you<br>=C2=A0 would with transaction sponsors.<br><br>So I don't unde=
rstand the objection here.<br><br>Also, I didn't mean to discourage exi=
sting work on package relay or<br>fixing RBF, which seem clearly important.=
Maybe I should have noted<br>that explicitly in the original message<br><b=
r>> I don't think a sponsor is a silver-bullet to solve all the<br>&=
gt; L2-related mempool issues. It won't solve the most concerning pinni=
ng<br>> attacks, as I think the bottleneck is replace-by-fee. Neither so=
lve<br>> the issues encumbered by the L2s by the dust limit.<br><br>I=
9;m not familiar with the L2 dust-limit issues, and I do think that<br>&quo=
t;fixing" RBF behavior is *probably* worthwhile. Those issues aside, I=
<br><div>think the transaction sponsors idea may be closer to a silver bull=
et <br></div><div>than you're giving it credit for, because designing s=
pecifically for the<br></div>fee-management use case has some big benefits.=
<br><br>For one, it makes migration easier. That is to say: there is none,<=
br>whereas there is existing RBF policy that needs consideration. <br><br>B=
ut maybe more importantly, transaction sponsors' limited use case also<=
br>allows for specifying much more targeted "replacement" policy =
since<br>sponsors are special-purpose transactions that only exist to<br>dy=
namically bump feerate. E.g. my SIGHASH_{NONE,SINGLE}|ANYONECANPAY<br>propo=
sal might make complete sense for the sponsors/fee-management use<br>case, =
and clarify the replacement problem, but obviously wouldn't work<br>for=
more general transaction replacement. In other words, RBF's<br>general=
nature might make it a much harder problem to solve well.<br></div>
</blockquote></div>
--000000000000e4a84a05d803d203--
|