Re: [Lightning-dev] A Note on Public Communication

2023-05-09 Thread Vincenzo Palazzo
Hi Micheal (and all), > Perhaps we need another moderator or two for the lightning-dev mailing list? > There are already a lot of emails on the bitcoin-dev mailing list and so > despite my views on the trend of Bitcoin and Lightning discussion becoming > increasingly intertwined it probably mak

[Lightning-dev] [Proposal][Payment Route Reservation] PTLC/HTLC with Reusable Static Invoices

2023-05-09 Thread g0b1el via Lightning-dev
Proposal Summary The following proposal is intended to adapt the existing PTLC protocol into Payment Route Reservation[1] flow. Modifying the original PTLC protocol slightly, we get support for reusable static invoices with atomic proof of payment and payer proofs, that don't

Re: [Lightning-dev] Liquidity griefing for 0-conf dual-funded txs

2023-05-09 Thread Matt Morehouse
Hi Bastien, In general, 0-conf is only safe when WE are the only contributor to the channel, otherwise the peer could double spend us. The problem you seem to be describing is that we might double-spend ourselves if we don't lock our 0-conf UTXOs at some point. I propose that we DO lock our UTXO

[Lightning-dev] Fixing a griefing attack on JIT Channels using PTLCs

2023-05-09 Thread Ben Carman
Hi everyone, I was chatting with Tony Giorgio the other day and he made me aware of a potential griefing attack that is possible today on LSPs that provide Just-In-Time channels. The attack is very simple, when the LSP receives the payment and then opens a 0-conf channel to the client, the cli

Re: [Lightning-dev] Fixing a griefing attack on JIT Channels using PTLCs

2023-05-09 Thread SomberNight via Lightning-dev
Hi benthecarman, > the LSP can give the funding transaction signed using adaptor sigs to the > client and the client can then decrypt the signatures and broadcast the > transaction. Then the LSP can find the transaction in the mempool and extract > the secret they need to claim the payment Wha

Re: [Lightning-dev] Fixing a griefing attack on JIT Channels using PTLCs

2023-05-09 Thread ZmnSCPxj via Lightning-dev
Good morning benthecarman and SomberNight, As noted by SomberNight, PTLCs does not quite fix this, as the client can still wait out the inbound PTLC of the LSP and force the LSP to perform an onchain action to ensure it does not give a channel for free. Another wrinkle here is that the LSP can

Re: [Lightning-dev] Liquidity griefing for 0-conf dual-funded txs

2023-05-09 Thread ZmnSCPxj via Lightning-dev
Good morning Matt, and t-bast, Your proposal basically means "do not dual-fund 0-conf". You might as well use the much simpler openv1 flow in that case, just because it is simpler. Regards, ZmnSCPxj Sent with Proton Mail secure email. --- Original Message --- On Tuesday, May 9th, 20