summaryrefslogtreecommitdiff
path: root/92/59d283a475c7583eec6a405157f5b2fd8b2f95
blob: af53594da910b18d65bad9c3fdd56d8ee4e57eed (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
Return-Path: <antoine.riard@gmail.com>
Received: from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])
 by lists.linuxfoundation.org (Postfix) with ESMTP id D9C0BC002D
 for <bitcoin-dev@lists.linuxfoundation.org>;
 Fri, 21 Oct 2022 01:50:44 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by smtp3.osuosl.org (Postfix) with ESMTP id A0B5360DF9
 for <bitcoin-dev@lists.linuxfoundation.org>;
 Fri, 21 Oct 2022 01:50:44 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org A0B5360DF9
Authentication-Results: smtp3.osuosl.org;
 dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com
 header.a=rsa-sha256 header.s=20210112 header.b=bMGQ930N
X-Virus-Scanned: amavisd-new at osuosl.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
 DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001,
 HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001,
 SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from smtp3.osuosl.org ([127.0.0.1])
 by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id JC-5JGAWzZe8
 for <bitcoin-dev@lists.linuxfoundation.org>;
 Fri, 21 Oct 2022 01:50:43 +0000 (UTC)
X-Greylist: whitelisted by SQLgrey-1.8.0
DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org C9DC860D94
Received: from mail-il1-x12e.google.com (mail-il1-x12e.google.com
 [IPv6:2607:f8b0:4864:20::12e])
 by smtp3.osuosl.org (Postfix) with ESMTPS id C9DC860D94
 for <bitcoin-dev@lists.linuxfoundation.org>;
 Fri, 21 Oct 2022 01:50:42 +0000 (UTC)
Received: by mail-il1-x12e.google.com with SMTP id 8so916564ilj.4
 for <bitcoin-dev@lists.linuxfoundation.org>;
 Thu, 20 Oct 2022 18:50:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;
 h=to:subject:message-id:date:from:in-reply-to:references:mime-version
 :from:to:cc:subject:date:message-id:reply-to;
 bh=Ck334HQ6fnqR6N6t57K+UHo/8EMUyb7kTLr1V3kwFR4=;
 b=bMGQ930NQDm6mcNrxMaclUQqmo+ZA6Kl7+2EW/IIodVL7VIqpyjb1tNcjmnTmq4lKe
 vk71CuDflr4k6XPeJOkCTJJPEsg/Yddtjd9uvWk4CegzYWIYnxpXvbc5D09llE2xwtsY
 3riEy4H18OfoIStLdviy7dDF6Hz1k/SoFeY+jsTLy/t257Khu/T58fOoj5rRuAKwXaH/
 j2d13KeyJdbgBVabCdlJrJPft2KlCLgm9JRVgkk5EA4RLcid9VzKBVSeix39LVWQfb7g
 hQOSuteVe4NiQOpVYyQEIb+sXxXIwAUgLfveBX/6qrGyomisyuezYiEVX7imtEBCAVBF
 9ehg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20210112;
 h=to:subject:message-id:date:from:in-reply-to:references:mime-version
 :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;
 bh=Ck334HQ6fnqR6N6t57K+UHo/8EMUyb7kTLr1V3kwFR4=;
 b=sda5odWPxL2WOJtQWmFszkYv8AlXxTq5AFN7twX96LAhojBYfwhC7pN30cUiQ/72pp
 wAMZaovxNBhk8uJitH1q9DDza1+kIpxa9ovhBiI7p+UgVizoYHj4GvYj5aL4nv4Mbl6j
 7xy4BZFSMqKkVtIwdnwbP9vne3bRRC04JxMAKzmQWbC6ot6SB7ihx3fRN4C+1puxg9fq
 rH16DHxGkGeItWsEXGycIddoeZ35zvFQcDXbMa6bQnVYM4+8DFXGqefJUXNRUHqWvTv4
 YMXegYHUklUjo/6TyTFie9CYMLbmTDQqESIuJlZfV/iVfZH26/yoI2E4vNVeEDwOaeN4
 Ac1Q==
X-Gm-Message-State: ACrzQf3Vf/DuvyKw8/+PzXNn/OO6hGhEeB42MCSsEbhrUXa3B3Bm71ut
 Tqsd6A6XQP5MybHA6ZAVzRK3j/zCnQXbW7no9UU=
X-Google-Smtp-Source: AMsMyM6ntpKqXHjGlNXqDBIpt9TivZnnsuFSD8je1pdJ4mOHfeSmQ0aVeczeeU7/2iu+YYpyBt9M6aHED6Ocpfg/6Tw=
X-Received: by 2002:a92:3652:0:b0:2df:4133:787 with SMTP id
 d18-20020a923652000000b002df41330787mr12169769ilf.39.1666317041746; Thu, 20
 Oct 2022 18:50:41 -0700 (PDT)
MIME-Version: 1.0
References: <CAKiPDnSsKPhL9-0pJBNav6SYJ45qiuxB6X-NMa1i65vHrxK2bA@mail.gmail.com>
In-Reply-To: <CAKiPDnSsKPhL9-0pJBNav6SYJ45qiuxB6X-NMa1i65vHrxK2bA@mail.gmail.com>
From: Antoine Riard <antoine.riard@gmail.com>
Date: Thu, 20 Oct 2022 21:50:30 -0400
Message-ID: <CALZpt+FPWSFbr6r-5J0YO1o3SvMQC4Gyj-QWTJ4yA3ZbJtOUxQ@mail.gmail.com>
To: Dario Sneidermanis <dario@muun.com>, 
 Bitcoin Protocol Discussion <bitcoin-dev@lists.linuxfoundation.org>
Content-Type: multipart/alternative; boundary="0000000000005b487d05eb81abf6"
X-Mailman-Approved-At: Fri, 21 Oct 2022 08:53:05 +0000
Subject: Re: [bitcoin-dev] Analysis of full-RBF deployment methods
X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>, 
 <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>, 
 <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Oct 2022 01:50:45 -0000

--0000000000005b487d05eb81abf6
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Dario,

Thanks for this analysis of full-RBF deployment methods!

The subject was widely discussed at today Bitcoin Core IRC meetings:
https://gnusha.org/bitcoin-core-dev/2022-10-20.log

Personally, I still think deferring full-rbf deployment, while it sounds
reasonable to let existing services and applications adapt their software
and business models, doesn't come risk-free for the contracting protocols
and multi-party applications affected by the pinning DoS vector. Deferring
ad vitam aeternam left them exposed to disruptions when their traffic
volume would start to be significant. While those use-cases
(splicing/dual-channels/collaborative constructions) were mostly vaporware
a year ago when I raised the issue, it turns out they have become a far
more tangible reality today. Beyond the 3 coinjoins services
(Wasabi/Joinmarket/Whirlpool), we have new things like ln-vortex, or
Phoenix wallet and some LDK users planning to use dual-funded soon.

I'm fully aware we still have community stakeholders opposing full-rbf on
principle, I think this is highly valuable to exchange more perspectives on
the subject, hopefully to harmonize understandings, and work altogether on
creative solutions to accommodate as many use-cases as we can, in a
compatible way.

I don't know what the best full-rbf deployment method is, though one
offering clear visibility and predictability to node operators, with a flag
day activation like #26323 sounds like a reasonable one. As you said, I
believe 6 months from now is far too short, maybe something like 12 months
or 16 months (or more ?) is adequate. At least I fully rejoin on the risk
of merchants centralization if we favor a timeline only favoring entities
with sufficient manpower.

I'm still looking forward to having more forums and communication channels
between business/services operators and protocol developers, it sounds like
functional responsibilities between protocol and application layers could
be better clarified. However, I don't know if it should be the
responsibility of developers to solve every operational risk encumbered by
a Bitcoin business, like FX risk. I don't deny the interdependency between
network policy rules and business risk, I'm just saying Bitcoin protocol
developers have already heavily loaded engineering priorities between
solving the half of dozen of Lightning vulnerabilities, working on the next
consensus changes or reviewing modularity refactoring of Bitcoin Core to
extend the feature set in a soft way (among tons of other examples).

All speaking for myself, looking forward to having more perspective
expressed!

Best,
Antoine

Le jeu. 20 oct. 2022 =C3=A0 12:56, Dario Sneidermanis via bitcoin-dev <
bitcoin-dev@lists.linuxfoundation.org> a =C3=A9crit :

> Hello list,
>
> Given that the release of 24.0 is upon us and there is little time to mak=
e
> a
> complex decision regarding the deployment method of full-RBF, we've
> documented
> the different alternatives and their trade-offs. I hope this helps get to
> the
> best possible deployment!
>
> Gist: https://gist.github.com/esneider/4eb16fcd959cb8c6b657c314442801ee
>
> # Current deployment options
>
> 1. Antoine's PR #26305: leave 24.0 as is, and merge opt-out in 25.0 or
> later.
> 2. Marco's PR #26287: revert opt-in full-RBF in 24.0, and give more time =
to
>    figure out what's next.
> 3. Marco's PR #26287 + Antoine's PR #26305: revert opt-in full-RBF in
> 24.0, and
>    merge opt-out in 25.0 or later.
> 4. Marco's PR #26287 + Anthony's PR #26323 (just the date commitment):
> revert
>    opt-in full-RBF in 24.0, and commit in 25.0 or later to a later date f=
or
>    opt-out activation.
> 5. Anthony's PR #26323: revert opt-in full-RBF in 24.0, and commit in 24.=
0
> to a
>    later date for opt-out activation.
>
> Notice that once full-RBF is fully deployed, having a config option to
> disable
> it is mostly a foot gun: you will only hurt yourself by missing some
> transactions. Maybe options 4 and 5 could remove the flag altogether
> instead of
> making it opt-out.
>
> There are a few more options, but I don't think they would reasonably hav=
e
> any
> consensus, so I trimmed them down to make it easier to process.
>
>
> # Dimensions of analysis
>
> 1. Zero-conf apps immediately affected
>
>     If we leave the flag for full-rbf in 24.0, zero-conf apps could be
>     immediately affected. More specifically, as Anthony explained much mo=
re
>     clearly [0], they would be in danger as soon as a relatively big mini=
ng
>     pool operator enables the full-RBF flag.
>
>     It turns out that the class of apps that could be immediately affecte=
d
> (ie.
>     apps that were directly or indirectly relying on the first-seen polic=
y
> in an
>     adversarial setting) is larger than zero-conf apps, as exposed by
> Sergej
>     [1]. Namely, the apps committing to an exchange rate before on-chain
> funds
>     are sent/finalized would start offering a free(ish) american call
> option.
>
> 2. Predictable deployment date
>
>     Committing to an activation date for full-rbf on the social layer (eg=
.
>     "we'll merge the opt-out flag in 25.0") has the benefit of being
> flexible in
>     the event of new data points but becomes less predictable (both for
>     applications and for full-rbf proponents).
>
>     Committing to an activation date for full-rbf on the code has the
> benefit
>     that once node operators start deploying the code, the date is set in
> stone,
>     and we can reason about when full-RBF will be fully deployed and
> usable.
>
> 3. Code complexity
>
>     Handling the commitment to a date in the code introduces further code
>     complexity. In particular, it's a deployment mechanism that, as far a=
s
> I
>     know, hasn't been tried before, so we should be careful.
>
> 4. Smooth deployment
>
>     Full-RBF deployment has two distinct phases when analyzing the
> adoption in
>     the transaction relaying layer. First, there will be multiple disjoin=
t
>     connected components of full-RBF nodes. Eventually, we'll get to a
>     single(ish) connected component of full-RBF nodes.
>
>     The first deployment phase is a bit chaotic and difficult to reason
> about:
>     nobody can rely on full-RBF actually working; if it coincides with a
>     high-fees scenario, we'll get a big mempool divergence event, causing
> many
>     other issues and unreliability in the relaying and application layers=
.
>
>     I'm calling smooth deployment to a deployment that minimizes the firs=
t
>     phase, eg. by activating full-RBF simultaneously in as many
>     transaction-relaying nodes as possible.
>
> 5. Time to figure out the right deployment
>
>     Figuring out the right deployment method and timeline to activate
> full-rbf
>     might be more time-consuming than what we are willing to wait for the
> stable
>     release of 24.0. Decoupling the protection to zero-conf apps from
> choosing a
>     deployment method and an activation date for opt-out might be a good
> idea.
>
> I'm probably forgetting some dimensions here, but it may be enough to
> grasp the
> trade-offs between the different approaches.
>
>
> # Comparison
>
> Gist:
> https://gist.github.com/esneider/4eb16fcd959cb8c6b657c314442801ee#compari=
son
>
> # Timeline for full-RBF activation
>
> If we make some UX trade-offs, Muun can be production ready with the
> required
> changes in 6 months. Having more time to avoid those trade-offs would be
> preferable, but we can manage.
>
> The larger application ecosystem may need a bit more time since they migh=
t
> not
> have the advantage of having been working on the required changes for a
> while
> already. Ideally, there should be enough time to reach out to affected
> applications and let them make time to understand the impact, design
> solutions,
> implement them, and deploy them.
>
> Finally, if a smooth deployment (as previously defined) is desired, we ca=
n
> lock
> an activation date in the code and give relaying nodes enough time to
> upgrade
> before activation. Assuming that the adoption of future releases remains
> similar
> to previous ones [2], one release cycle should get us to 22% adoption, tw=
o
> release cycles to 61% adoption, and three release cycles to 79% adoption.
> Assuming a uniform adoption distribution, the probability of an
> 8-connection
> relaying node not being connected to any full-RBF node after one release
> cycle
> will be 0.14. After two cycles, it will be 0.00054, and after three
> cycles, it
> will be 0.0000038. Looking at these numbers, it would seem that a single
> release
> cycle will be too little time, but two release cycles may be enough.
>
> Cheers,
> Dario
>
>
> [0]
> https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-October/0210=
31.html
> [1]
> https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-October/0210=
56.html
> [2] https://luke.dashjr.org/programs/bitcoin/files/charts/software.html
> [Marco's PR #26287] https://github.com/bitcoin/bitcoin/pull/26287
> [Antoine's PR #26305] https://github.com/bitcoin/bitcoin/pull/26305
> [Anthony's PR #26323] https://github.com/bitcoin/bitcoin/pull/26323
> _______________________________________________
> bitcoin-dev mailing list
> bitcoin-dev@lists.linuxfoundation.org
> https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev
>

--0000000000005b487d05eb81abf6
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Dario,<br><br>Thanks for this analysis of full-RBF depl=
oyment methods!<br><br>The subject was widely discussed at today Bitcoin Co=
re IRC meetings:<br><a href=3D"https://gnusha.org/bitcoin-core-dev/2022-10-=
20.log">https://gnusha.org/bitcoin-core-dev/2022-10-20.log</a><br><br>Perso=
nally, I still think deferring full-rbf deployment, while it sounds reasona=
ble to let existing services and applications adapt their software and busi=
ness models, doesn&#39;t come risk-free for the contracting protocols and m=
ulti-party applications affected by the pinning DoS vector. Deferring ad vi=
tam aeternam left them exposed to disruptions when their traffic volume wou=
ld start to be significant. While those use-cases (splicing/dual-channels/c=
ollaborative constructions) were mostly vaporware a year ago when I raised =
the issue, it turns out they have become a far more tangible reality today.=
 Beyond the 3 coinjoins services (Wasabi/Joinmarket/Whirlpool), we have new=
 things like ln-vortex, or Phoenix wallet and some LDK users planning to us=
e dual-funded soon.<br><br>I&#39;m fully aware we still have community stak=
eholders opposing full-rbf on principle, I think this is highly valuable to=
 exchange more perspectives on the subject, hopefully to harmonize understa=
ndings, and work altogether on creative solutions to accommodate as many us=
e-cases as we can, in a compatible way.<br><br>I don&#39;t know what the be=
st full-rbf deployment method is, though one offering clear visibility and =
predictability to node operators, with a flag day activation like #26323 so=
unds like a reasonable one. As you said, I believe 6 months from now is far=
 too short, maybe something like 12 months or 16 months (or more ?) is adeq=
uate. At least I fully rejoin on the risk of merchants centralization if we=
 favor a timeline only favoring entities with sufficient manpower.<br><br>I=
&#39;m still looking forward to having more forums and communication channe=
ls between business/services operators and protocol developers, it sounds l=
ike functional responsibilities between protocol and application layers cou=
ld be better clarified. However, I don&#39;t know if it should be the respo=
nsibility of developers to solve every operational risk encumbered by a Bit=
coin business, like FX risk. I don&#39;t deny the interdependency between n=
etwork policy rules and business risk, I&#39;m just saying Bitcoin protocol=
 developers have already heavily loaded engineering priorities between solv=
ing the half of dozen of Lightning vulnerabilities, working on the next con=
sensus changes or reviewing modularity refactoring of Bitcoin Core to exten=
d the feature set in a soft way (among tons of other examples).<br><br>All =
speaking for myself, looking forward to having more perspective expressed!<=
br><br>Best,<br>Antoine<br></div><br><div class=3D"gmail_quote"><div dir=3D=
"ltr" class=3D"gmail_attr">Le=C2=A0jeu. 20 oct. 2022 =C3=A0=C2=A012:56, Dar=
io Sneidermanis via bitcoin-dev &lt;<a href=3D"mailto:bitcoin-dev@lists.lin=
uxfoundation.org">bitcoin-dev@lists.linuxfoundation.org</a>&gt; a =C3=A9cri=
t=C2=A0:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px=
 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div di=
r=3D"ltr">Hello list,<br><br>Given that the release of 24.0 is upon us and =
there is little time to make a<br>complex decision regarding the deployment=
 method of full-RBF, we&#39;ve documented<br>the different alternatives and=
 their trade-offs. I hope this helps get to the<br>best possible deployment=
!<br><br>Gist: <a href=3D"https://gist.github.com/esneider/4eb16fcd959cb8c6=
b657c314442801ee" target=3D"_blank">https://gist.github.com/esneider/4eb16f=
cd959cb8c6b657c314442801ee</a><br><br># Current deployment options<br><br>1=
. Antoine&#39;s PR #26305: leave 24.0 as is, and merge opt-out in 25.0 or l=
ater.<br>2. Marco&#39;s PR #26287: revert opt-in full-RBF in 24.0, and give=
 more time to<br>=C2=A0 =C2=A0figure out what&#39;s next.<br>3. Marco&#39;s=
 PR #26287 + Antoine&#39;s PR #26305: revert opt-in full-RBF in 24.0, and<b=
r>=C2=A0 =C2=A0merge opt-out in 25.0 or later.<br>4. Marco&#39;s PR #26287 =
+ Anthony&#39;s PR #26323 (just the date commitment): revert<br>=C2=A0 =C2=
=A0opt-in full-RBF in 24.0, and commit in 25.0 or later to a later date for=
<br>=C2=A0 =C2=A0opt-out activation.<br>5. Anthony&#39;s PR #26323: revert =
opt-in full-RBF in 24.0, and commit in 24.0 to a<br>=C2=A0 =C2=A0later date=
 for opt-out activation.<br><br>Notice that once full-RBF is fully deployed=
, having a config option to disable<br>it is mostly a foot gun: you will on=
ly hurt yourself by missing some<br>transactions. Maybe options 4 and 5 cou=
ld remove the flag altogether instead of<br>making it opt-out.<br><br>There=
 are a few more options, but I don&#39;t think they would reasonably have a=
ny<br>consensus, so I trimmed them down to make it easier to process.<br><b=
r><br># Dimensions of analysis<br><br>1. Zero-conf apps immediately affecte=
d<br><br>=C2=A0 =C2=A0 If we leave the flag for full-rbf in 24.0, zero-conf=
 apps could be<br>=C2=A0 =C2=A0 immediately affected. More specifically, as=
 Anthony explained much more<br>=C2=A0 =C2=A0 clearly [0], they would be in=
 danger as soon as a relatively big mining<br>=C2=A0 =C2=A0 pool operator e=
nables the full-RBF flag.<br><br>=C2=A0 =C2=A0 It turns out that the class =
of apps that could be immediately affected (ie.<br>=C2=A0 =C2=A0 apps that =
were directly or indirectly relying on the first-seen policy in an<br>=C2=
=A0 =C2=A0 adversarial setting) is larger than zero-conf apps, as exposed b=
y Sergej<br>=C2=A0 =C2=A0 [1]. Namely, the apps committing to an exchange r=
ate before on-chain funds<br>=C2=A0 =C2=A0 are sent/finalized would start o=
ffering a free(ish) american call option.<br><br>2. Predictable deployment =
date<br><br>=C2=A0 =C2=A0 Committing to an activation date for full-rbf on =
the social layer (eg.<br>=C2=A0 =C2=A0 &quot;we&#39;ll merge the opt-out fl=
ag in 25.0&quot;) has the benefit of being flexible in<br>=C2=A0 =C2=A0 the=
 event of new data points but becomes less predictable (both for<br>=C2=A0 =
=C2=A0 applications and for full-rbf proponents).<br><br>=C2=A0 =C2=A0 Comm=
itting to an activation date for full-rbf on the code has the benefit<br>=
=C2=A0 =C2=A0 that once node operators start deploying the code, the date i=
s set in stone,<br>=C2=A0 =C2=A0 and we can reason about when full-RBF will=
 be fully deployed and usable.<br><br>3. Code complexity<br><br>=C2=A0 =C2=
=A0 Handling the commitment to a date in the code introduces further code<b=
r>=C2=A0 =C2=A0 complexity. In particular, it&#39;s a deployment mechanism =
that, as far as I<br>=C2=A0 =C2=A0 know, hasn&#39;t been tried before, so w=
e should be careful.<br><br>4. Smooth deployment<br><br>=C2=A0 =C2=A0 Full-=
RBF deployment has two distinct phases when analyzing the adoption in<br>=
=C2=A0 =C2=A0 the transaction relaying layer. First, there will be multiple=
 disjoint<br>=C2=A0 =C2=A0 connected components of full-RBF nodes. Eventual=
ly, we&#39;ll get to a<br>=C2=A0 =C2=A0 single(ish) connected component of =
full-RBF nodes.<br><br>=C2=A0 =C2=A0 The first deployment phase is a bit ch=
aotic and difficult to reason about:<br>=C2=A0 =C2=A0 nobody can rely on fu=
ll-RBF actually working; if it coincides with a<br>=C2=A0 =C2=A0 high-fees =
scenario, we&#39;ll get a big mempool divergence event, causing many<br>=C2=
=A0 =C2=A0 other issues and unreliability in the relaying and application l=
ayers.<br><br>=C2=A0 =C2=A0 I&#39;m calling smooth deployment to a deployme=
nt that minimizes the first<br>=C2=A0 =C2=A0 phase, eg. by activating full-=
RBF simultaneously in as many<br>=C2=A0 =C2=A0 transaction-relaying nodes a=
s possible.<br><br>5. Time to figure out the right deployment<br><br>=C2=A0=
 =C2=A0 Figuring out the right deployment method and timeline to activate f=
ull-rbf<br>=C2=A0 =C2=A0 might be more time-consuming than what we are will=
ing to wait for the stable<br>=C2=A0 =C2=A0 release of 24.0. Decoupling the=
 protection to zero-conf apps from choosing a<br>=C2=A0 =C2=A0 deployment m=
ethod and an activation date for opt-out might be a good idea.<br><br>I&#39=
;m probably forgetting some dimensions here, but it may be enough to grasp =
the<br>trade-offs between the different approaches.<br><br><br># Comparison=
<br><br>Gist: <a href=3D"https://gist.github.com/esneider/4eb16fcd959cb8c6b=
657c314442801ee#comparison" target=3D"_blank">https://gist.github.com/esnei=
der/4eb16fcd959cb8c6b657c314442801ee#comparison</a><br><br># Timeline for f=
ull-RBF activation<br><br>If we make some UX trade-offs, Muun can be produc=
tion ready with the required<br>changes in 6 months. Having more time to av=
oid those trade-offs would be<br>preferable, but we can manage.<br><br>The =
larger application ecosystem may need a bit more time since they might not<=
br>have the advantage of having been working on the required changes for a =
while<br>already. Ideally, there should be enough time to reach out to affe=
cted<br>applications and let them make time to understand the impact, desig=
n solutions,<br>implement them, and deploy them.<br><br>Finally, if a smoot=
h deployment (as previously defined) is desired, we can lock<br>an activati=
on date in the code and give relaying nodes enough time to upgrade<br>befor=
e activation. Assuming that the adoption of future releases remains similar=
<br>to previous ones [2], one release cycle should get us to 22% adoption, =
two<br>release cycles to 61% adoption, and three release cycles to 79% adop=
tion.<br>Assuming a uniform adoption distribution, the probability of an 8-=
connection<br>relaying node not being connected to any full-RBF node after =
one release cycle<br>will be 0.14. After two cycles, it will be 0.00054, an=
d after three cycles, it<br>will be 0.0000038. Looking at these numbers, it=
 would seem that a single release<br>cycle will be too little time, but two=
 release cycles may be enough.<br><br>Cheers,<br>Dario<br><br><br>[0] <a hr=
ef=3D"https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-October/=
021031.html" target=3D"_blank">https://lists.linuxfoundation.org/pipermail/=
bitcoin-dev/2022-October/021031.html</a><br>[1] <a href=3D"https://lists.li=
nuxfoundation.org/pipermail/bitcoin-dev/2022-October/021056.html" target=3D=
"_blank">https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2022-Octob=
er/021056.html</a><br>[2] <a href=3D"https://luke.dashjr.org/programs/bitco=
in/files/charts/software.html" target=3D"_blank">https://luke.dashjr.org/pr=
ograms/bitcoin/files/charts/software.html</a><br>[Marco&#39;s PR #26287] <a=
 href=3D"https://github.com/bitcoin/bitcoin/pull/26287" target=3D"_blank">h=
ttps://github.com/bitcoin/bitcoin/pull/26287</a><br>[Antoine&#39;s PR #2630=
5] <a href=3D"https://github.com/bitcoin/bitcoin/pull/26305" target=3D"_bla=
nk">https://github.com/bitcoin/bitcoin/pull/26305</a><br>[Anthony&#39;s PR =
#26323] <a href=3D"https://github.com/bitcoin/bitcoin/pull/26323" target=3D=
"_blank">https://github.com/bitcoin/bitcoin/pull/26323</a><br></div>
_______________________________________________<br>
bitcoin-dev mailing list<br>
<a href=3D"mailto:bitcoin-dev@lists.linuxfoundation.org" target=3D"_blank">=
bitcoin-dev@lists.linuxfoundation.org</a><br>
<a href=3D"https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev" =
rel=3D"noreferrer" target=3D"_blank">https://lists.linuxfoundation.org/mail=
man/listinfo/bitcoin-dev</a><br>
</blockquote></div>

--0000000000005b487d05eb81abf6--