From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193] helo=mx.sourceforge.net) by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1RgM3k-0005DE-MG for bitcoin-development@lists.sourceforge.net; Thu, 29 Dec 2011 19:54:40 +0000 X-ACL-Warn: Received: from sulfur.webpack.hosteurope.de ([217.115.142.104]) by sog-mx-3.v43.ch3.sourceforge.com with esmtp (Exim 4.76) id 1RgM3i-0007ad-QL for bitcoin-development@lists.sourceforge.net; Thu, 29 Dec 2011 19:54:40 +0000 Received: from 84-72-69-153.dclient.hispeed.ch ([84.72.69.153] helo=[192.168.0.21]); authenticated by sulfur.webpack.hosteurope.de running ExIM with esmtpsa (TLSv1:AES256-SHA:256) id 1RgM3c-0003c8-Im; Thu, 29 Dec 2011 20:54:32 +0100 Message-ID: <4EFCC574.1030901@justmoon.de> Date: Thu, 29 Dec 2011 20:54:28 +0100 From: Stefan Thomas User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:8.0) Gecko/20111105 Thunderbird/8.0 MIME-Version: 1.0 To: bitcoin-development@lists.sourceforge.net References: In-Reply-To: Content-Type: multipart/alternative; boundary="------------060600040103070108020100" X-bounce-key: webpack.hosteurope.de;moon@justmoon.de;1325188478;9d2863c7; X-Spam-Score: 0.7 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. 1.0 HTML_MESSAGE BODY: HTML included in message -0.3 AWL AWL: From: address is in the auto white-list X-Headers-End: 1RgM3i-0007ad-QL Subject: Re: [Bitcoin-development] Alternative to OP_EVAL X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Dec 2011 19:54:40 -0000 This is a multi-part message in MIME format. --------------060600040103070108020100 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit > RE: delaying EVAL rollout: I could live with rolling out just BIP 11 > (up-to-3-signature-CHECKMULTISIG as 'standard' transactions) and > delaying EVAL rollout on the main network, but I worry that will just > encourage people to delay thoroughly reviewing/testing for a couple of > months, and we'll be right back here at the beginning of March. How about releasing it on testnet first? If you want "less smart" people such as myself to help test, well I don't think I would get anywhere if I tried to abstractly reason about every possibility. Low-level testing is certainly important, but for me "thorough testing" requires an actual network of nodes (running different clients) and applications capable of creating and verifying real OP_EVAL transactions. My suggestion would be: Deploy OP_EVAL on testnet quickly, let's build some real-life applications and if it works well, /then /let's pull the trigger for mainnet. If some issues or improvements arise, we'll have a chance to adjust it and try again. I don't think this is too conservative or paranoid. I think this is a textbook use case for testnet. On 12/29/2011 7:00 PM, Gavin Andresen wrote: > RE: preventing OP_EVAL from executing the result of calculations: > >> This is not adequate: OP_SHA256 OP_EVAL runs random code that is more> than 5 bytes. > Good point, the rule should be "OP_EVAL shall fail if asked to execute > 8 or fewer bytes." > > RE: this minor disadvantage: > >>> OP_EVALs are not executed, and so the code associated with them does >>> not have to be part of the transaction, if they are in the >>> non-executed branch of an OP_IF. That could be good for privacy, and >>> could be good for reducing block-chain size. >> I don't understand the above paragraph. > It is the "Either This or That can redeem" case that motivated me to > allow 2-deep EVAL recursion. > > Start with the most straightforward code for doing "this or that" (in > pseudocode): > > scriptSig: > scriptPuKey: > IF EQUALS hash of This or hash of That: > EVAL > ELSE > fail validation > ENDIF > > That can be done with CODESEPARATOR/CODEHASH. > > But if you want to then bundle that up so the scriptPubKey is a > standard 'pay to script', you get: > > scriptSig: > > scriptPubKey: ... standard DUP HASH160<> EQUALVERIFY EVAL > > To be backwards compatible with old clients the scriptSig would have to be: > > CODESEPARATOR this_or_that_code > CODEHASH > CODESEPARATOR > IF does not equal hash2: > fail verification > ENDIF > > That could only be done if the definition of CODEHASH was modified to > hash only the stuff between CODESEPARATORS instead of hashing from > CODESEPARATOR to the end of the scriptSig. > > RE: static analysis: > >> Yes, but maybe there is other static analysis miners may want to do. I >> can't imagine every scenario. > The vast majority of miners are "discouraging" (not relaying or > putting into blocks) anything besides 'standard' transaction types. > > Until somebody smarter than me (like Russell) has done a deep analysis > of Script and all of its opcodes, I don't think that should change. > The standard transaction types are easy to reason about, and the > standard types extended with OP_EVAL are also easy to reason about-- > you can template-match them to find out how many ECDSA operations a > CHECKMULTISIG will do, etc. > > Again, in practice, I don't think EVAL as proposed is a danger. > > RE: delaying EVAL rollout: I could live with rolling out just BIP 11 > (up-to-3-signature-CHECKMULTISIG as 'standard' transactions) and > delaying EVAL rollout on the main network, but I worry that will just > encourage people to delay thoroughly reviewing/testing for a couple of > months, and we'll be right back here at the beginning of March. > --------------060600040103070108020100 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit
RE: delaying EVAL rollout:  I could live with rolling out just BIP 11
(up-to-3-signature-CHECKMULTISIG as 'standard' transactions) and
delaying EVAL rollout on the main network, but I worry that will just
encourage people to delay thoroughly reviewing/testing for a couple of
months, and we'll be right back here at the beginning of March.

How about releasing it on testnet first? If you want "less smart" people such as myself to help test, well I don't think I would get anywhere if I tried to abstractly reason about every possibility. Low-level testing is certainly important, but for me "thorough testing" requires an actual network of nodes (running different clients) and applications capable of creating and verifying real OP_EVAL transactions.

My suggestion would be: Deploy OP_EVAL on testnet quickly, let's build some real-life applications and if it works well, then let's pull the trigger for mainnet. If some issues or improvements arise, we'll have a chance to adjust it and try again.

I don't think this is too conservative or paranoid. I think this is a textbook use case for testnet.


On 12/29/2011 7:00 PM, Gavin Andresen wrote:
RE: preventing OP_EVAL from executing the result of calculations:

This is not adequate: <data> OP_SHA256 OP_EVAL runs random code that is more> than 5 bytes.
Good point, the rule should be "OP_EVAL shall fail if asked to execute
8 or fewer bytes."

RE: this minor disadvantage:

 OP_EVALs are not executed, and so the code associated with them does
not have to be part of the transaction, if they are in the
non-executed branch of an OP_IF. That could be good for privacy, and
could be good for reducing block-chain size.

      
I don't understand the above paragraph.
It is the "Either This or That can redeem" case that motivated me to
allow 2-deep EVAL recursion.

Start with the most straightforward code for doing "this or that" (in
pseudocode):

scriptSig:  <sigs> <either the code for This or the code for That>
scriptPuKey:
  IF <hash of code> EQUALS hash of This or hash of That:
    EVAL
  ELSE
    fail validation
  ENDIF

That can be done with CODESEPARATOR/CODEHASH.

But if you want to then bundle that up so the scriptPubKey is a
standard 'pay to script', you get:

scriptSig:  <sigs> <either the code for This or the code for That>
<serialized IF... code from above>
scriptPubKey:  ... standard DUP HASH160 <> EQUALVERIFY EVAL

To be backwards compatible with old clients the scriptSig would have to be:

<hash1> <hash2> <sigs> CODESEPARATOR this_or_that_code
 CODEHASH
 CODESEPARATOR
 IF <hash of code> does not equal hash2:
   fail verification
 ENDIF

That could only be done if the definition of CODEHASH was modified to
hash only the stuff between CODESEPARATORS instead of hashing from
CODESEPARATOR to the end of the scriptSig.

RE: static analysis:

Yes, but maybe there is other static analysis miners may want to do.  I
can't imagine every scenario.
The vast majority of miners are "discouraging" (not relaying or
putting into blocks) anything besides 'standard' transaction types.

Until somebody smarter than me (like Russell) has done a deep analysis
of Script and all of its opcodes, I don't think that should change.
The standard transaction types are easy to reason about, and the
standard types extended with OP_EVAL are also easy to reason about--
you can template-match them to find out how many ECDSA operations a
CHECKMULTISIG will do, etc.

Again, in practice, I don't think EVAL as proposed is a danger.

RE: delaying EVAL rollout:  I could live with rolling out just BIP 11
(up-to-3-signature-CHECKMULTISIG as 'standard' transactions) and
delaying EVAL rollout on the main network, but I worry that will just
encourage people to delay thoroughly reviewing/testing for a couple of
months, and we'll be right back here at the beginning of March.


--------------060600040103070108020100--