Return-Path: Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id B599027F3 for ; Sat, 20 Apr 2019 03:26:18 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.7.6 Received: from mail-wr1-f68.google.com (mail-wr1-f68.google.com [209.85.221.68]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id CF52079 for ; Sat, 20 Apr 2019 03:26:17 +0000 (UTC) Received: by mail-wr1-f68.google.com with SMTP id w10so8895670wrm.4 for ; Fri, 19 Apr 2019 20:26:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=BHf2UcZsLOCZF9Ctu2Xzi+qQTSNrjIswNeAd/O9gAVw=; b=tHKIYnPrF9aM9zLDLEM38W69ugm1TA51j87BaVcGwXRItUsiOTJM2x0uy2bhoBeIQ/ UZQyAHuV9w3Q7d342z4+Hrt7TvMCLJgaQcugRxa6lI+Q3jSR6Euzhtnp3cp6VrDvnYFY 6sp8Zb1mvETxd1tY+rS95y0zEDrCSnK4JctoW5As32sG35eKKmMzr6UmLLZCTeZ5JWCh H3uxSeNrexPc5QwuezGRRamD9+IdGSDHdbzcDlSrUkgbGImMYXjuJ0nn3vnHfXDpIs00 6GCDVvmMUqC1DjjDhbZOWx9n+bb4SisDZJTweRri4c3jhi+mJfJkH6599NmF0mEfEqMf dVSQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=BHf2UcZsLOCZF9Ctu2Xzi+qQTSNrjIswNeAd/O9gAVw=; b=XzLpjHBjxMxJbMDcm02GFDsRaVY3wQ96Mc7Il2JXxaqu7+OTtCy3075VaiUq/u75hV k//3V/roK0V46nuciW9CBgTfpKvXtExONCJ/i5ak0d5LOZOHC7iYdGPJZaNeqovDEyJ4 +sIMyBZ6X39UL0FgfWKDdxlYleRtc5r7oOasPBHBsC/GDX+u+2BEVtjdO/l5RI3cDUcZ wMi4XS4tzfRsakAHIRmnsSh2cBB3BKIMGJL9mpmxoWwIs10WKVNWqa75tX9nVzb9JDK6 cPEvRzjyyfyXyC2dILSldxpSXlLYOJ6tNcJAuhDFjuW+ufScY2CVT6GTVB70f9skn4YZ B95g== X-Gm-Message-State: APjAAAVMKm03fQ3WM6speiG7qYorAL92JjBywB/txcw96FQsNadF5VoW VsCoIBWFlC6KaPPbBuSqmSJJoGPHYrxfSX+uDs2PG+o678g= X-Google-Smtp-Source: APXvYqztJtgKVw0wsyvo3hPZWpDqw0xXKTIrODgg+CtMK7FzHlhgsnKzG70BuHURxm0GiWzvmJ6GxCLb/JgcoYs9AfA= X-Received: by 2002:adf:df0f:: with SMTP id y15mr5433967wrl.175.1555730776305; Fri, 19 Apr 2019 20:26:16 -0700 (PDT) MIME-Version: 1.0 References: <-tCD0qh97dAiz-VGkDQTwSbSQIm9cLF1kOzaWCnUDTI4dKdsmMgHJsGDntQhABZdE2_yBYpPAAdulm8EpdNxOB8o3lI6ZQJBJZWF1INzUrE=@protonmail.com> In-Reply-To: From: Ruben Somsen Date: Sat, 20 Apr 2019 05:26:03 +0200 Message-ID: To: Bitcoin Protocol Discussion Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, FREEMAIL_FROM, RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org X-Mailman-Approved-At: Sat, 20 Apr 2019 14:21:03 +0000 Subject: Re: [bitcoin-dev] Improving SPV security with PoW fraud proofs X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 20 Apr 2019 03:26:18 -0000 Hi ZmnSCPxj, >There is no safe way to use UTXO sets without identifying who is telling you those sets are valid, or making it expensive to lie >The first option requires trust and is weaker than SPV, the second requires committing to a proof-of-work Olaoluwa Osuntokun's BIP157 manages to function without a commitment: "If the client receives conflicting filter headers from different peers for any block and filter type, it SHOULD interrogate them to determine which is faulty." I am wondering if the same logic can be applied to UTXO sets or the fraud proofs I just described. >This makes no sense >or you trust that every peer you have is not omitting the proof. It's the latter, you trust every peer you have is not omitting the proof. It requires one honest peer. The reason this is acceptable is because you're already making that assumption. If none of your peers are honest, you have no guarantee of hearing about the chain with the most PoW. Again, this is not a new observation. I am just recalling the fraud proof debate from when it was being considered for segwit (though of course it's possible I got some details wrong). -- Ruben Somsen On Sat, Apr 20, 2019 at 3:59 AM ZmnSCPxj wrote: > > Good morning, > > > > > As I understand it, this requires that UTXO commitments be mandatory. > > > > Perhaps UTXO sets can be made useful without committing them. I have > > some very loose thoughts on the subject, I consider it an open > > question. > > There is no safe way to use UTXO sets without identifying who is telling you those sets are valid, or making it expensive to lie. > The first option requires trust and is weaker than SPV, the second requires committing to a proof-of-work (and probably best to fold it into the Bitcoin blockchain if so). > > You would get the UTXO commitment from the previous block (if the UTXO commitment is in the coinbase, then all you need is the Merkle proof of the coinbase). > > > > > > > More difficult is: how can an SPV node acquire the UTXO set at a particular block? > > > > I think you are asking fair questions about how the UTXO set > > commitments would work in practice, and how viable that makes it. I'm > > not sure. The most comprehensive work I have seen on this topic has > > been the utreexo proposal by Tadge Dryja: > > https://www.youtube.com/watch?v=edRun-6ubCc > > > > Actually, now that I think about it... As an alternative to UTXO set > > commitments, the old fraud proofs idea for segwit can be applied here. > > > > We get miners to commit to the location of the UTXOs that are being > > spent (e.g. transaction 5 in block 12). This allows full nodes to > > succinctly prove invalidity to SPV clients in the following ways: > > > > - a committed location does not contain the stated UTXO > > - the UTXO has already been spent in a prior block > > > > If no fraud proofs are given, then the inputs can be assumed to be valid. > > > > As you may recall, these kinds of fraud proofs were abandoned mainly > > because the data unavailability claim could only be verified by > > downloading the data, resulting in a DoS vector where all blocks had > > to be downloaded. This problem does not seem to apply here, because we > > are only interested in blocks which have forks, so it's more doable to > > download them. > > This makes no sense. > In order to validate block N, you need to know that every UTXO spent by a transaction in block N is valid. > The UTXO you want to validate is located in some other block, not on the single block you are verifying. > > Thus the non-existent fraud proof can only be validated by loading the block of the UTXO purported to be spent, and every block between that and the current block you are verifying, i.e. fullnode. > Either that or you trust that every peer you have is not omitting the proof. > > Regards, > ZmnSCPxj