Return-Path: Received: from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133]) by lists.linuxfoundation.org (Postfix) with ESMTP id 79FC5C0001 for ; Wed, 12 May 2021 13:19:53 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp2.osuosl.org (Postfix) with ESMTP id 6463B4014D for ; Wed, 12 May 2021 13:19:53 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org X-Spam-Flag: NO X-Spam-Score: -2.099 X-Spam-Level: X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: smtp2.osuosl.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from smtp2.osuosl.org ([127.0.0.1]) by localhost (smtp2.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SNH1V9uHBsKQ for ; Wed, 12 May 2021 13:19:51 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.8.0 Received: from mail-wr1-x430.google.com (mail-wr1-x430.google.com [IPv6:2a00:1450:4864:20::430]) by smtp2.osuosl.org (Postfix) with ESMTPS id 238F840002 for ; Wed, 12 May 2021 13:19:51 +0000 (UTC) Received: by mail-wr1-x430.google.com with SMTP id v12so23575204wrq.6 for ; Wed, 12 May 2021 06:19:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=YmDO7oRgGQB2fLFbvmsgAiT5pWGozN/rqkKhWsfWuEo=; b=p4gtl0Q0f0Yr766AHxLCjc9ivyKbfWhlj1XgN40Qn+uMwWfEJYkNk0zA6uScrc4xWa 2UGl3SL6J7gJxh+Lyok7WCeZqoe0Tzu0wUutnMf+oF31Py3/KZ3WogLsOnKxqT0KKRVb pkrDQTdGWj6qPqoZr+9786LvZnXt8W8Cc2ZUDsFFAvt91tvb5fompfvVUgAwzBzSCxp4 UAFkW2tEHUmKT/BiFo6vTvSRe8omD6IlYL1/iOAftC0Dv6xca4NyeZdtkYkIa4xyZ3En Ej24f8cbFORjSbVaCrYdIaw2y8BjDU0QHMTOXGS2ZhFaQTiRiYayxjN2l+VXBdvTSwng izAQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=YmDO7oRgGQB2fLFbvmsgAiT5pWGozN/rqkKhWsfWuEo=; b=hTMF7oLgVGfwpO8CvHF3/d0wwRJXaxk1eArsjsxQPWNOHaUKKcq5sQCndJ1vna7FNv mMXuiNd2LXcQhkL7xaEjFi6ssrZJwgnAtn/dQeeECsdqo6BpBWoLXDkeD/Q3K6tTuDME peOoJKvmCOF+fr8QfkUH6EiWJ/LUjZ5/Tajd60ajbZYTEgeYdNqFXYIgsVg4yJlNgBQy Jx3SJs7t1NmDMTaiutD+JbqU0In/exwjk+ab7tVP6+uzdxoJtLc9VGBwh1Ye9I9K9/vq OKdejKS76vJ24sdEjx5vVDbSsIMYDpUxZtTNwG+xGU2nzM5kiJssB0yIyrGo3+ds7ET7 WHeQ== X-Gm-Message-State: AOAM531lSAM6l/FJGOqhXtSkZ+NqrwA06ZjZZTKaz/GEsl/Buif+JVg+ hxEnE4kw4f43ahajpbbKuD8stT83LBQteHsy0EcrJXtr8G+eEA== X-Google-Smtp-Source: ABdhPJwYJrkeyDGhbqpuG1vWBWtdBAS2x1CN/Ug4sVI0MYwitQ4IPo9m/t5qq0sq29HH2rYp2BPpDXJeA+w8TF/Dc8s= X-Received: by 2002:a05:6000:184a:: with SMTP id c10mr1164649wri.244.1620825589346; Wed, 12 May 2021 06:19:49 -0700 (PDT) MIME-Version: 1.0 References: <202105112150.51410.luke@dashjr.org> In-Reply-To: <202105112150.51410.luke@dashjr.org> From: Antoine Riard Date: Wed, 12 May 2021 09:19:37 -0400 Message-ID: To: Luke Dashjr Content-Type: multipart/alternative; boundary="0000000000007ef2e605c221dd3f" X-Mailman-Approved-At: Wed, 12 May 2021 13:30:25 +0000 Cc: Bitcoin Protocol Discussion Subject: Re: [bitcoin-dev] Full Disclosure: CVE-2021-31876 Defect in Bitcoin Core's bip125 logic X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 May 2021 13:19:53 -0000 --0000000000007ef2e605c221dd3f Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Hi Luke, > Is there a list of software impacted by this CVE, and the versions it is fixed in? Speaking only for LN clients, as I think they're the only ones deployed with real funds at stake. Defect is mitigated by new "anchor" channel type, forcing RBF-signaling on all transactions. * lnd v0.12 "anchor" activated by default, lnd v0.10 "anchor" activated by user flag * c-lightning, no release yet with "anchor" support * eclair, no release yet with "anchor" support * rust-lightning, no release yet with "anchor" support > (Note this isn't a vulnerability in Bitcoin Core; BIP125 is strictly a policy matter, not part of the consensus rules and never safe to rely on in any case...) Answering two-folds. First I somehow agree it's not a "vulnerability" in Bitcoin Core but at least a clear lack of compliance to a heavily relied-on bitcoin standard through the ecosystem. Even if BIPs are descriptive documentation and not prescriptive, I don't think we have guidelines for now on how to proceed with identified flaws with security implications for downstream projects. Should the Bitcoin Core project adopt a security bulletin or advisories for security-related info pertinent for downstream ? Secondly, opinions were divergent on the security list on how to report on this. On one side, tx-relay and mempool acceptance rules aren't considered as reliable or strongly normative and purely a matter of node's policy. On the other side, we have more and more deployed Bitcoin applications/protocols (e.g LN, vaults, ...) directly making security assumptions on them. Even if we consider such beliefs misplaced or ingenious, we're laying on top of a permissionless system and can't really prevent developers and users from deploying such softwares. Should we stay on this statu quo and invite such Bitcoin users to deploy their own overlay network for transaction propagation satisfying their advanced requirements, at the price of far-less censorship-resistance and a more opaque fee market for everyone ? Or instead qualify a new, third set of rules between consensus and pure "policy", especially crafted to support Bitcoin applications requiring transparency and stability of tx-relay and mempool acceptance rules, at the price of ossifying some part of full-nodes ? Of course, the degree of normativity we could guarantee for those rules is making them compatible with economic incentives of everyone. Hopefully fostering their wide dissemination across full-node implementations and miner mempools. You have good arguments and trade-offs on both sides. Overall, I agree that describing tx-relay/mempool rules as non-normative, non-reliable is the most understood mental model among developers *today*. That said, I would like to underscore that this model might not be adequate in light of recent ecosystem evolutions and reveal itself a bit crippling the future... Cheers, Antoine Le mar. 11 mai 2021 =C3=A0 17:51, Luke Dashjr a =C3=A9cri= t : > Is there a list of software impacted by this CVE, and the versions it is > fixed > in? > > (Note this isn't a vulnerability in Bitcoin Core; BIP125 is strictly a > policy > matter, not part of the consensus rules and never safe to rely on in any > case...) > > > On Thursday 06 May 2021 13:55:53 Antoine Riard via bitcoin-dev wrote: > > Hi, > > > > I'm writing to report a defect in Bitcoin Core bip125 logic with minor > > security and operational implications for downstream projects. Though > this > > defect grieves Bitcoin Core nodes 0.12.0 and above, base layer safety > isn't > > impacted. > > > > # Problem > > > > Bip 125 specification describes the following signalling mechanism : > > > > " > > This policy specifies two ways a transaction can signal that it is > > replaceable. > > > > * Explicit signaling: A transaction is considered to have opted in to > > allowing replacement of itself if any of its inputs have an nSequence > > number less than (0xffffffff - 1). > > > > * Inherited signaling: Transactions that don't explicitly signal > > replaceability are replaceable under this policy for as long as any one > of > > their ancestors signals replaceability and remains unconfirmed. > > > > One or more transactions currently in the mempool (original transaction= s) > > will be replaced by a new transaction (replacement transaction) that > spends > > one or more of the same inputs if, > > > > # The original transactions signal replaceability explicitly or through > > inheritance as described in the above Summary section. > > " > > > > An unconfirmed child transaction with nSequence =3D 0xff_ff_ff_ff spend= ing > an > > unconfirmed parent with nSequence <=3D 0xff_ff_ff_fd should be replacea= ble > as > > the child transaction signals "through inheritance". However, the > > replacement code as implemented in Core's `PreChecks()` shows that this > > behavior isn't enforced and Core's mempool rejects replacement attempt= s > of > > an unconfirmed child transaction. > > > > Branch asserting the behavior is here : > > https://github.com/ariard/bitcoin/commits/2021-03-test-rbf > > > > # Solution > > > > The defect has not been patched. > > > > # Downstream Projects Affected > > > > * LN : State-of-the-art pinning attacks against second-stage HTLCs > > transactions were thought to be only possible by exploiting RBF rule 3 = on > > the necessity of a higher absolute fee [0]. However, this replacement > > defect opens the way for an attacker to only pin with an opt-out child > > without a higher fee than the honest competing transaction. This lowers > the > > cost of attack as the malicious pinning transaction only has to be abov= e > > mempools'min feerate. This also increases odds of attack success for a > > reduced feerate diminishes odds of confirmation ending the pinning. > > > > A functional test demo illustrating cases is available on this branch: > > https://github.com/ariard/bitcoin/commits/2021-05-htlc-preimage-pinning= s > > > > LN nodes operators concerned by this defect might favor anchor outputs > > channels, fully mitigating this specific pinning vector. > > > > * Onchain DLC/Coinswap/Vault : Those contract protocols have also > multiple > > stages of execution with time-sensitive transactions opening the way to > > pinning attacks. Those protocols being non-deployed or in early phase, = I > > would recommend that any in-protocol competing transactions explicitly > > signal RBF. > > > > * Coinjoin/Cut-Through : if CPFP is employed as a fee-bumping strategy, > if > > the coinjoin transaction is still laying in network mempools, if a > > fee-bumping output is spendable by any protocol participant, this > > fee-bumping mechanism might be halted by a malicious protocol participa= nt > > broadcasting an low-feerate opt-out child. According to bip125, if the > > coinjoin parent tx signals replaceability, the child transaction should > be > > replaceable, whatever its signaling. However Core doesn't apply this > > policy. RBF of the coinjoin transaction itself should be used as a > > fallback. I'm not aware of any deployed coinjoin using such > > "anyone-can-bump" fee-bumping strategy. > > > > * Simple wallets : RBF engines' behaviors might be altered in ways not > > matching the intent of their developers. I invite RBF engines dev to > verify > > what those components are doing in the light of disclosed information. > > > > # Discovery > > > > While reviewing the LN dual-funding flow, I inquired on potential new D= oS > > vectors introduced by relying on counterparty utxos in this following > > analysis [1]. The second DoS issue "RBF opt-out by a Counterparty > > Double-Spend" is relying on a malicious chain of transactions where the > > parent is signaling RBF opt-in through nSequence<=3D0xff_ff_ff_ff-1 but= the > > child, servicing as a pinning transaction, opt-out from the RBF policy. > > This pinning trick conception was matching my understanding of Core cod= e > > but while reading again the specification, I observed that it was > > inconsistent from the inherited signaling mechanism as described in the > > bip's "Summary" section. > > > > After exercising the logic, I did submit the defect to Dave Harding, > asking > > confirmation of divergence between Bitcoin Core and BIP 125. Soon after= , > he > > did confirm it and pointed that the defect has been there since the > 2015's > > PR introducing the opt-in RBF, advicing to to consider security > > implications for deployed second-layer protocols. After noticing the > minor > > implications for pinning attacks on second-stage LN transactions while > > talking with Matt Corallo, I did disclose to the Bitcoin Core security > > list. > > > > My initial report was recommending avoiding a covert patch in the mempo= ol > > as risks of introducing DoS in this part of the codebase seemed to > outweigh > > security of deployed LN channels. This direction was agreed by the > opinions > > expressed on the security list. Beyond, there was a lack of agreement o= n > > how to proceed with the disclosure as so far in the history project, > > transaction relay policy have not been considered as strongly reliable. > > Though from now on, L2 protocols like Lightning are making assumptions = on > > subset of this policy for their safety, such as the highlighted RBF one= . > > > > Defect was disclosed to the LN projects maintainers, informing them tha= t > > currently in deployment anchor outputs protocol upgrade was mitigating > > against this defect though old channels will stay vulnerable. To the be= st > > of my knowledge, I didn't identify other deployed protocols of which > coins > > safety are impacted by this defect. > > > > # Ecosystem Observations > > > > This long-standing defect with benign security implications provided an > > opportunity to exercise coordinated security disclosure across layers a= nd > > development teams. > > > > IMO, it underlies few interesting points: > > * the lack of an established policy for coordinated security disclosure= s > > between a base layer implementation and its downstream projects > > * the lack of a clear methodology to identify downstream projects > affected > > by a transaction relay policy wreckage > > * the lack of minimally-disruptive, emergency upgrade mechanisms > > implemented by downstream projects [2] > > > > Finally, security implications for downstream projects provoked by base > > layer issues shouldn't be minimized as they do have a risk of windblow = on > > base layer operations. I believe we should minimize risks of disaster > > scenarios such as thousands of LN channels manually closed by worried > > operators due to a non-concerted security disclosure, provoking mempool > > cloaks and disrupting regular transactions for a while. > > > > # Timeline > > > > 2021-03-18 : Defect discovered, report to Dave Harding original author = of > > bip125, confirmation of the defect > > 2021-03-19 : Disclosure to the Bitcoin Core security list, Dave Harding= , > > Matt Corallo, acknowledgment of the issue > > 2021-04-05 : Disclosure to the LN projects maintainers (c-lightning, ln= d, > > eclair, electrum, rust-lightning) > > 2021-04-28 : CVE-2021-31876 assigned > > 2021-05-06 : Full disclosure to the bitcoin-dev mailing list > > > > I believe the information reported is correct and reflects the best of = my > > knowledge, please point any shortcoming. > > > > Cheers, > > Antoine > > > > [0] > > > https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-April/0026= 39 > >.html [1] See "On Mempool Funny Games against Multi-Party Funded > > Transactions", published 2021-05-06 > > [2] Such as > > > https://lists.linuxfoundation.org/pipermail/lightning-dev/2020-July/00276= 3 > . > >html > > --0000000000007ef2e605c221dd3f Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Hi Luke,

> Is there a list of software impacted = by this CVE, and the versions it is fixed
in?

Speaking only for = LN clients, as I think they're the only ones deployed with real funds a= t stake. Defect is mitigated by new "anchor" channel type, forcin= g RBF-signaling on all transactions.
* lnd v0.12 "anchor" acti= vated by default, lnd v0.10 "anchor" activated by user flag
* = c-lightning, no release yet with "anchor" support
* eclair, no= release yet with "anchor" support
* rust-lightning, no releas= e yet with "anchor" support

> (Note this isn't a vu= lnerability in Bitcoin Core; BIP125 is strictly a policy
matter, not pa= rt of the consensus rules and never safe to rely on in any
case...)
=
Answering two-folds.

First I somehow agree it's not a "= ;vulnerability" in Bitcoin Core but at least a clear lack of complianc= e to a heavily relied-on bitcoin standard through the ecosystem. Even if BI= Ps are descriptive documentation and not prescriptive, I don't think we= have guidelines for now on how to proceed with identified flaws with secur= ity implications for downstream projects.

Should the Bitcoin Core pr= oject adopt a security bulletin or advisories for security-related info per= tinent for downstream ?

Secondly, opinions were divergent on the sec= urity list on how to report on this. On one side, tx-relay and mempool acce= ptance rules aren't considered as reliable or strongly normative and pu= rely a matter of node's policy.

On the other side, we have more= and more deployed Bitcoin applications/protocols (e.g LN, vaults, ...) dir= ectly making security assumptions on them. Even if we consider such beliefs= misplaced or ingenious, we're laying on top of a permissionless system= and can't really prevent developers and users from deploying such soft= wares.

Should we stay on this statu quo and invite such Bitcoin user= s to deploy their own overlay network for transaction propagation satisfyin= g their advanced requirements, at the price of far-less censorship-resistan= ce and a more opaque fee market for everyone ?

Or instead qualify a = new, third set of rules between consensus and pure "policy", espe= cially crafted to support Bitcoin applications requiring transparency and s= tability of tx-relay and mempool acceptance rules, at the price of ossifyin= g some part of full-nodes ? Of course, the degree of normativity we could g= uarantee for those rules is making them compatible with economic incentives= of everyone. Hopefully fostering their wide dissemination across full-node= implementations and miner mempools.

You have good arguments and tra= de-offs on both sides.

Overall, I agree that describing tx-relay/me= mpool rules as non-normative, non-reliable is the most understood mental mo= del among developers *today*. That said, I would like to underscore that th= is model might not be adequate in light of recent ecosystem evolutions and = reveal itself a bit crippling the future...

Cheers,
Antoine

Le= =C2=A0mar. 11 mai 2021 =C3=A0=C2=A017:51, Luke Dashjr <luke@dashjr.org> a =C3=A9crit=C2=A0:
Is there a list of software i= mpacted by this CVE, and the versions it is fixed
in?

(Note this isn't a vulnerability in Bitcoin Core; BIP125 is strictly a = policy
matter, not part of the consensus rules and never safe to rely on in any case...)


On Thursday 06 May 2021 13:55:53 Antoine Riard via bitcoin-dev wrote:
> Hi,
>
> I'm writing to report a defect in Bitcoin Core bip125 logic with m= inor
> security and operational implications for downstream projects. Though = this
> defect grieves Bitcoin Core nodes 0.12.0 and above, base layer safety = isn't
> impacted.
>
> # Problem
>
> Bip 125 specification describes the following signalling mechanism : >
> "
> This policy specifies two ways a transaction can signal that it is
> replaceable.
>
> * Explicit signaling: A transaction is considered to have opted in to<= br> > allowing replacement of itself if any of its inputs have an nSequence<= br> > number less than (0xffffffff - 1).
>
> * Inherited signaling: Transactions that don't explicitly signal > replaceability are replaceable under this policy for as long as any on= e of
> their ancestors signals replaceability and remains unconfirmed.
>
> One or more transactions currently in the mempool (original transactio= ns)
> will be replaced by a new transaction (replacement transaction) that s= pends
> one or more of the same inputs if,
>
> # The original transactions signal replaceability explicitly or throug= h
> inheritance as described in the above Summary section.
> "
>
> An unconfirmed child transaction with nSequence =3D 0xff_ff_ff_ff spen= ding an
> unconfirmed parent with nSequence <=3D 0xff_ff_ff_fd should be repl= aceable as
> the child transaction signals "through inheritance". However= , the
> replacement code as implemented in Core's `PreChecks()` shows that= this
> behavior isn't=C2=A0 enforced and Core's mempool rejects repla= cement attempts of
> an unconfirmed child transaction.
>
> Branch asserting the behavior is here :
> https://github.com/ariard/bitcoin/com= mits/2021-03-test-rbf
>
> # Solution
>
> The defect has not been patched.
>
> # Downstream Projects Affected
>
> * LN : State-of-the-art pinning attacks against second-stage HTLCs
> transactions were thought to be only possible by exploiting RBF rule 3= on
> the necessity of a higher absolute fee [0]. However, this replacement<= br> > defect opens the way for an attacker to only pin with an opt-out child=
> without a higher fee than the honest competing transaction. This lower= s the
> cost of attack as the malicious pinning transaction only has to be abo= ve
> mempools'min feerate. This also increases odds of attack success f= or a
> reduced feerate diminishes odds of confirmation ending the pinning. >
> A functional test demo illustrating cases is available on this branch:=
> https://github.com/aria= rd/bitcoin/commits/2021-05-htlc-preimage-pinnings
>
> LN nodes operators concerned by this defect might favor anchor outputs=
> channels, fully mitigating this specific pinning vector.
>
> * Onchain DLC/Coinswap/Vault : Those contract protocols have also mult= iple
> stages of execution with time-sensitive transactions opening the way t= o
> pinning attacks. Those protocols being non-deployed or in early phase,= I
> would recommend that any in-protocol competing transactions explicitly=
> signal RBF.
>
> * Coinjoin/Cut-Through : if CPFP is employed as a fee-bumping strategy= , if
> the coinjoin transaction is still laying in network mempools, if a
> fee-bumping output is spendable by any protocol participant, this
> fee-bumping mechanism might be halted by a malicious protocol particip= ant
> broadcasting an low-feerate opt-out child. According to bip125, if the=
> coinjoin parent tx signals replaceability, the child transaction shoul= d be
> replaceable, whatever its signaling. However Core doesn't apply th= is
> policy. RBF of the coinjoin transaction itself should be used as a
> fallback. I'm not aware of any deployed coinjoin using such
> "anyone-can-bump" fee-bumping strategy.
>
> * Simple wallets : RBF engines' behaviors might be altered in ways= not
> matching the intent of their developers. I invite RBF engines dev to v= erify
> what those components are doing in the light of disclosed information.=
>
> # Discovery
>
> While reviewing the LN dual-funding flow, I inquired on potential new = DoS
> vectors introduced by relying on counterparty utxos in this following<= br> > analysis [1]. The second DoS issue "RBF opt-out by a Counterparty=
> Double-Spend" is relying on a malicious chain of transactions whe= re the
> parent is signaling RBF opt-in through nSequence<=3D0xff_ff_ff_ff-1= but the
> child, servicing as a pinning transaction, opt-out from the RBF policy= .
> This pinning trick conception was matching my understanding of Core co= de
> but while reading again the specification, I observed that it was
> inconsistent from the inherited signaling mechanism as described in th= e
> bip's "Summary" section.
>
> After exercising the logic, I did submit the defect to Dave Harding, a= sking
> confirmation of divergence between Bitcoin Core and BIP 125. Soon afte= r, he
> did confirm it and pointed that the defect has been there since the 20= 15's
> PR introducing the opt-in RBF, advicing to to consider security
> implications for deployed second-layer protocols. After noticing the m= inor
> implications for pinning attacks on second-stage LN transactions while=
> talking with Matt Corallo, I did disclose to the Bitcoin Core security=
> list.
>
> My initial report was recommending avoiding a covert patch in the memp= ool
> as risks of introducing DoS in this part of the codebase seemed to out= weigh
> security of deployed LN channels. This direction was agreed by the opi= nions
> expressed on the security list. Beyond, there was a lack of agreement = on
> how to proceed with the disclosure as so far in the history project, > transaction relay policy have not been considered as strongly reliable= .
> Though from now on, L2 protocols like Lightning are making assumptions= on
> subset of this policy for their safety, such as the highlighted RBF on= e.
>
> Defect was disclosed to the LN projects maintainers, informing them th= at
> currently in deployment anchor outputs protocol upgrade was mitigating=
> against this defect though old channels will stay vulnerable. To the b= est
> of my knowledge, I didn't identify other deployed protocols of whi= ch coins
> safety are impacted by this defect.
>
> # Ecosystem Observations
>
> This long-standing defect with benign security implications provided a= n
> opportunity to exercise coordinated security disclosure across layers = and
> development teams.
>
> IMO, it underlies few interesting points:
> * the lack of an established policy for coordinated security disclosur= es
> between a base layer implementation and its downstream projects
> * the lack of a clear methodology to identify downstream projects affe= cted
> by a transaction relay policy wreckage
> * the lack of minimally-disruptive, emergency upgrade mechanisms
> implemented by downstream projects [2]
>
> Finally, security implications for downstream projects provoked by bas= e
> layer issues shouldn't be minimized as they do have a risk of wind= blow on
> base layer operations. I believe we should minimize risks of disaster<= br> > scenarios such as thousands of LN channels manually closed by worried<= br> > operators due to a non-concerted security disclosure, provoking mempoo= l
> cloaks and disrupting regular transactions for a while.
>
> # Timeline
>
> 2021-03-18 : Defect discovered, report to Dave Harding original author= of
> bip125, confirmation of the defect
> 2021-03-19 : Disclosure to the Bitcoin Core security list, Dave Hardin= g,
> Matt Corallo, acknowledgment of the issue
> 2021-04-05 : Disclosure to the LN projects maintainers (c-lightning, l= nd,
> eclair, electrum, rust-lightning)
> 2021-04-28 : CVE-2021-31876 assigned
> 2021-05-06 : Full disclosure to the bitcoin-dev mailing list
>
> I believe the information reported is correct and reflects the best of= my
> knowledge, please point any shortcoming.
>
> Cheers,
> Antoine
>
> [0]
> https://lists.linuxf= oundation.org/pipermail/lightning-dev/2020-April/002639
>.html [1] See "On Mempool Funny Games against Multi-Party Funded > Transactions", published 2021-05-06
> [2] Such as
> https://lists.linuxfo= undation.org/pipermail/lightning-dev/2020-July/002763.
>html

--0000000000007ef2e605c221dd3f--