Good morning again ariard and t-bast,

> 
> For cases where the one doing splice-in is an LSP and the other side is a 
> client of that LSP, also consider this proposal: 
> https://github.com/BitcoinAndLightningLayerSpecs/lsp/pull/24
> 
> While it is designed for 0-conf channel funding, the actual protocol is 
> generic enough that it can be used where there is double-spend risk from an 
> LSP, that the client wants to protect against.
> This can applied to splice-in and channel factory construction, as the 
> protocol is simply a promise "I the LSP will do my best to get the 
> transaction with this TXID confirmed before some future blockheight, so you 
> the client can rest assured that even if it is unconfirmed now (0-conf) you 
> can always rely on it being confirmed later."

Actually, given that the LSP is held liable if the TXID never confirms, and the 
splice TXID has as input the previous funding txo, this is actually risky for 
the LSP.

Even if the client has given revocation keys for all states dependent on the 
previous funding txo, the client can still post, and have confirmed, a revoked 
state.
This prevents the LSP from ever getting the splice TXID confirmed.
The client loses all its funds in the channel, but in exchange the LSP is held 
liable for not getting the splice TXID confirmed and the LSP reputation is 
destroyed.

Regards,
ZmnSCPxj
_______________________________________________
Lightning-dev mailing list
[email protected]
https://lists.linuxfoundation.org/mailman/listinfo/lightning-dev

Reply via email to