From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] helo=mx.sourceforge.net) by sfs-ml-4.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1YPXlu-0000IO-Gs for bitcoin-development@lists.sourceforge.net; Sun, 22 Feb 2015 14:44:38 +0000 Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of gmail.com designates 74.125.82.44 as permitted sender) client-ip=74.125.82.44; envelope-from=natanael.l@gmail.com; helo=mail-wg0-f44.google.com; Received: from mail-wg0-f44.google.com ([74.125.82.44]) by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1YPXls-0007MN-CQ for bitcoin-development@lists.sourceforge.net; Sun, 22 Feb 2015 14:44:38 +0000 Received: by mail-wg0-f44.google.com with SMTP id k14so21310420wgh.3 for ; Sun, 22 Feb 2015 06:44:30 -0800 (PST) MIME-Version: 1.0 X-Received: by 10.194.200.233 with SMTP id jv9mr13673283wjc.51.1424616270320; Sun, 22 Feb 2015 06:44:30 -0800 (PST) Received: by 10.194.28.170 with HTTP; Sun, 22 Feb 2015 06:44:30 -0800 (PST) Received: by 10.194.28.170 with HTTP; Sun, 22 Feb 2015 06:44:30 -0800 (PST) In-Reply-To: References: <20150222123428.GA6570@savin.petertodd.org> Date: Sun, 22 Feb 2015 15:44:30 +0100 Message-ID: From: Natanael To: Peter Todd Content-Type: multipart/alternative; boundary=047d7bb70c7ebbdb50050fae52f6 X-Spam-Score: -0.6 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (natanael.l[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 1.0 HTML_MESSAGE BODY: HTML included in message -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1YPXls-0007MN-CQ Cc: bitcoin-development@lists.sourceforge.net Subject: Re: [Bitcoin-development] alternate proposal opt-in miner takes double-spend (Re: replace-by-fee v0.10.0rc4) X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 22 Feb 2015 14:44:38 -0000 --047d7bb70c7ebbdb50050fae52f6 Content-Type: text/plain; charset=UTF-8 Den 22 feb 2015 14:29 skrev "Natanael" : > > > Den 22 feb 2015 13:36 skrev "Peter Todd" : > > > Implementing it as a general purpose scripting language improvement has > > a lot of advantages, not least of which is that you no longer need to > > rely entirely on inherently unreliable P2P networking: Promise to never > > create two signatures for a specific BIP32 root pubkey and make > > violating that promise destroy and/or reallocate a fidelity bond whose > > value is locked until some time into the future. Since the fidelity bond > > is a separate pool of funds, detection of the double-spend can happen > > later. > > Somebody sent me a zero-confirmation transaction, or one that got orphaned after one block. I created a transaction spending that UTXO, and another. > > So at that point I have UTXO_orphaned based on the sender's UTXO_origin and my UTXO_old (because I've had it unspent for a long time), both in one transaction, creating UTXO_new. > > Now he doublespend UTXO_origin to create a UTXO_doublespend (which conflicts with UTXO_orphaned). He conspires with a miner to get it into a block. > > Now what? Can my UTXO_old effectively be tainted forever because UTXO_new got invalidated together with UTXO_orphaned? Will that transaction be a valid proof of doublespend against a new UTXO_replacement I created? > > Or otherwise, if only transactions where all UTXO's are currently valid works as doublespend proofs, aren't you still just left without protection against any one miner that conspires with doublespend attempting thieves? > > In other words, you are unprotected and potentially at greater risk if you create a transaction depending on another zero-confirmation transaction. Additional comments: If you punish the creation of UTXO_replacement, you will punish people who was lead to think zero-confirmation transactions were safe and thus that chains of zero-confirmation transactions also were safe. If you don't, but STILL accept chains of zero-confirmation transactions were not all of them are covered by fidelity bonds, then you failed to protect yourself against thieves who creates chains of unconfirmed transactions. Another question: if all transactions in the chain are covered by fidelity bonds for their own value, which one pays out to who? Does only the first one pay out, and only to the last party in the chain? Or to every subsequent party after him? In full or just a fraction? Why, why not? You might not know which of these serviced their customers in full without getting full value back in exchange due to the doublespend. What if the fidelity bond is too small, do you stop accepting it as a zero-confirmation transaction? Do you even accept chains of unconfirmed transactions at all? --047d7bb70c7ebbdb50050fae52f6 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable


Den 22 feb 2015 14:29 skrev "Natanael" <natanael.l@gmail.com>:
>
>
> Den 22 feb 2015 13:36 skrev "Peter Todd" <pete@petertodd.org>:
>
> > Implementing it as a general purpose scripting language improveme= nt has
> > a lot of advantages, not least of which is that you no longer nee= d to
> > rely entirely on inherently unreliable P2P networking: Promise to= never
> > create two signatures for a specific BIP32 root pubkey and make > > violating that promise destroy and/or reallocate a fidelity bond = whose
> > value is locked until some time into the future. Since the fideli= ty bond
> > is a separate pool of funds, detection of the double-spend can ha= ppen
> > later.
>
> Somebody sent me a zero-confirmation transaction, or one that got orph= aned after one block. I created a transaction spending that UTXO, and anoth= er.
>
> So at that point I have UTXO_orphaned based on the sender's UTXO_o= rigin and my UTXO_old (because I've had it unspent for a long time), bo= th in one transaction, creating UTXO_new.
>
> Now he doublespend UTXO_origin to create a UTXO_doublespend (which con= flicts with UTXO_orphaned). He conspires with a miner to get it into a bloc= k.
>
> Now what? Can my UTXO_old effectively be tainted forever because UTXO_= new got invalidated together with UTXO_orphaned? Will that transaction be a= valid proof of doublespend against a new UTXO_replacement I created?
>
> Or otherwise, if only transactions where all UTXO's are currently = valid works as doublespend proofs, aren't you still just left without p= rotection against any one miner that conspires with doublespend attempting = thieves?
>
> In other words, you are unprotected and potentially at greater risk if= you create a transaction depending on another zero-confirmation transactio= n.

Additional comments:

If you punish the creation of UTXO_replacement, you will pun= ish people who was lead to think zero-confirmation transactions were safe a= nd thus that chains of zero-confirmation transactions also were safe.

If you don't, but STILL accept chains of zero-confirmati= on transactions were not all of them are covered by fidelity bonds, then yo= u failed to protect yourself against thieves who creates chains of unconfir= med transactions.

Another question: if all transactions in the chain are cover= ed by fidelity bonds for their own value, which one pays out to who? Does o= nly the first one pay out, and only to the last party in the chain? Or to e= very subsequent party after him? In full or just a fraction? Why, why not? = You might not know which of these serviced their customers in full without = getting full value back in exchange due to the doublespend.

What if the fidelity bond is too small, do you stop acceptin= g it as a zero-confirmation transaction?

Do you even accept chains of unconfirmed transactions at all= ?

--047d7bb70c7ebbdb50050fae52f6--