-
Notifications
You must be signed in to change notification settings - Fork 491
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lightning Specification Meeting 2022/10/10 #1030
Comments
We're entering DST mess, not 100% sure I got the meeting time right, I may update it at the last minute if it's wrong, watch closely. |
There's a topic I'd like to pick everyone's brain on as well, that came up in #765 (comment) Why do we include EDIT: we figured it out, posting here for others wondering why it's done this way. This is to protect against probing that would let the next-to-last node discover that they are the next-to-last node (leaking the identity of the recipient). |
Is that reason still valid now that we have the payment secret? |
I don't see how the |
I thought that you were referring to the probing as described in #608. What would the type of probing that you mention look like assuming there wouldn't be an outgoing_cltv in the final hop onion? |
Without
|
But is it indeed the case that a relay node would fail? In LND I see: Looks like forwards are also accepted if the delta is bigger. So maybe the opposite is currently the case, at least with lnd? Relay nodes accept off by one, where as final nodes don't. |
Good catch, I believe we actually have a probing issue today because the intermediate relaying behavior doesn't match the final node behavior...what you're highlighting of lnd's relaying behavior matches the specification and what eclair does, but the final node checks for equality of the htlc expiry and the onion payload expiry, since Bolt 4 says (where
That indicates that A good topic to discuss during today's meeting! |
I detailed a sample scenario to showcase this, my current conclusion is that @joostjager is right that we should allow a higher Alice sends a payment to Carol with the following path:
Bob wants to probe and creates an htlc for Carol with If instead Carol wants to probe and creates an htlc for Dave with This probing also works with amounts. If instead Carol wants to probe and creates an htlc for Dave with |
That's a nice addition. I was focusing on the sender overpaying the fee to meet a min_htlc policy, but what you're saying doesn't even require that. The routing node just taking an msat out of his fee. |
forwarding instructions are too strict:
inherited ID thing as an alternative to APO:
taproot chans:
|
Thanks @Roasbeef for the notes! |
The meeting will take place on Monday 2022/10/10 at 7pm UTC (5:30am Adelaide time) on Libera Chat IRC #lightning-dev. It is open to the public.
A video link is available for higher bandwidth communication: https://meet.jit.si/Lightning-Spec-Meeting
Pull Request Review
total_msat
when paying #1031Anchor outputs zero fee htlc txs test vectors Add test vectors for option_anchors_zero_fee_htlc_tx #1018Tlv stream in onion failures TLV failure message and length relaxation #1021Add dust exposure threshold Add amax_dust_htlc_exposure_msat
#919Route blinding Route Blinding (Feature 24/25) #765Onion messages BOLT 7: Onion message support (features 38/39) #759Offers Offers #798Closing fee range turn-based protocol option_closing_rejected: turn-based fee_range coop close (feature 60/61) #1016Update static channel parameters zzz-extension-bolt: dynamic commitments #1026Waiting for interop
Fix channel pruning behaviorDual funding interactive-tx: Add dual-funding flow, using the interactive tx protocol (feature 28/29) #851Don't force close until error is received afterchannel_reestablish
Nodes shouldn't publish their commitment when receiving outdatedchannel_reestablish
#934Graph dump ongossip_timestamp_filter
Inconsistent behavior around graph dump ongossip_timestamp_filter
. #980Websocket transport websocket address type: allow transport over RFC6455 #891Long Term Updates
Pinning attacks as related to splicing / dynamic commitments: https://lists.linuxfoundation.org/pipermail/lightning-dev/2022-August/003665.htmlLiquidity ads option_will_fund: liquidity ads #878Quiescence BOLT 2: quiescence protocol (feature 34/35) option_quiesce #869Splicing Splice draft (feature 62/63) #863Simplified commitment Feature 106/107: option_simplified_update. #867Hold htlcs before forwarding Add the ability to hold HTLCs before forwarding (FEAT 52/53) #989Trampoline routing Trampoline Routing (2021 edition) (Feature 56/57) #829 and Trampoline onion format (Feature 56/57) #836Upfront payments / DoS protection Hold fees #843 and https://lists.linuxfoundation.org/pipermail/lightning-dev/2022-August/003673.htmlPeer storage backup Peer backup storage (feature 40/41/42/43) #881Anonymous gossipBacklog
The following are topics that we should discuss at some point, so if we have time to discuss them great, otherwise they slip to the next meeting.
lnprototest (https://github.com/rustyrussell/lnprototest)The text was updated successfully, but these errors were encountered: