From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136]) by lists.linuxfoundation.org (Postfix) with ESMTP id 59D84C0012 for ; Fri, 31 Dec 2021 03:11:05 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 45C5360C0F for ; Fri, 31 Dec 2021 03:11:05 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org X-Spam-Flag: NO X-Spam-Score: -2.098 X-Spam-Level: X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: smtp3.osuosl.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0RbzUj8zB8ep for ; Fri, 31 Dec 2021 03:11:03 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.8.0 Received: from mail-wm1-x330.google.com (mail-wm1-x330.google.com [IPv6:2a00:1450:4864:20::330]) by smtp3.osuosl.org (Postfix) with ESMTPS id 1B8326058D for ; Fri, 31 Dec 2021 03:11:02 +0000 (UTC) Received: by mail-wm1-x330.google.com with SMTP id f134-20020a1c1f8c000000b00345c05bc12dso14193876wmf.3 for ; Thu, 30 Dec 2021 19:11:02 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ODEUozJWn0RbZfXS7KyomnxMS6KfSLvWk/15aEFGvPw=; b=iR+jD4FQtYEG6y7+Ig5TEeGwt9Lw8MG//dikik72wx+BuEZZqO7b+IIrqfuQjh7xkf vCzjmTsoEwc5Nn4BhTCztbgCdaQc/YgPoBDj1PiGJ0M/lVr9un9RptlNNw4bJJzD7sry NToIYFrJGI6N1ovw4r1pvAESYKn7Ej2WZao2EMVUcw6cZd89dhSGMIMqx0bcLZbbDE2E nhPzRZU1p6kohB/SzOOhVjUN7xoQ2JlxO/cnM4snyY/jxjduziN0BOH38AMxdHpoQTpr RCnYZ7Bep7g8f0g3HHquvf0NsaINqsZ9ZBdroProO2RgImv52EO3XfxGkiaE9cZ7dFqt 0q0A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ODEUozJWn0RbZfXS7KyomnxMS6KfSLvWk/15aEFGvPw=; b=Hx1PUIETv3CrjesgLZlkJU4G8XQ2bRGr8PD9+UhTwSoqTPVY7nVoOr0ClyQO9Mxy2s /vg/xfe1aAQ06aQ4WRwk5ZEotHYBSsnX0KD9eUiIlEM7gy5wm7keo6M4LKyIn/eL2HMP BDh5/ZLaVnbjiYYBNAbFSO5JxycUVRJWGoJy0426IpkkgLPDPhGospv+uDIBKFYmiWnb NBVzeHDFTkPCVxouAO5/C9Sr+KNELHUCnMEXt3BAoDm9Ktvxdt60gW0zKZRee0V/JeCY 6aN3FR0xhH+ARd6dRwzhVHPJep3f7Zn2nTJltMzBoUEai+PjIuAuL0FV7wQBQrRFDkSo 8mBA== X-Gm-Message-State: AOAM53357dn3IAfoB5FxMto9ELX+wMV15t8ABPBDgyZhh/DegoJ7IkZE 7sTTzLRfl0QCw/5DLOPaxJYoh5ITuOsynsJfoOi3c9dZdbQ= X-Google-Smtp-Source: ABdhPJwE/uTH2MZn2pa9AYXsQpGvEQ6zmcVo35xr4hXwL9P+kvWYEQClxhZDYk6CEfDarPv/shLWOpBzXztqF9cHCj0= X-Received: by 2002:a05:600c:245:: with SMTP id 5mr28359944wmj.23.1640920261087; Thu, 30 Dec 2021 19:11:01 -0800 (PST) MIME-Version: 1.0 References: <20211014235207.GB6451@erisian.com.au> <1HjQQw-RXvEW5i73Hjx_QqDms44sQMnNWWl9oQ_SwIoYGpog6LzGK4M_omAEMXxgXIID37V7sdyG_AW8WkaNByppB2EJ7wlzOZgrDloMv2c=@protonmail.com> In-Reply-To: <1HjQQw-RXvEW5i73Hjx_QqDms44sQMnNWWl9oQ_SwIoYGpog6LzGK4M_omAEMXxgXIID37V7sdyG_AW8WkaNByppB2EJ7wlzOZgrDloMv2c=@protonmail.com> From: Keagan McClelland Date: Thu, 30 Dec 2021 20:10:48 -0700 Message-ID: To: Michael Folkson , Bitcoin Protocol Discussion Content-Type: multipart/alternative; boundary="00000000000044554e05d4688530" X-Mailman-Approved-At: Fri, 31 Dec 2021 09:34:47 +0000 Subject: Re: [bitcoin-dev] On the regularity of soft forks X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 31 Dec 2021 03:11:05 -0000 --00000000000044554e05d4688530 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable > But whether or not it is a basic principle of general software engineering kind of misses the point. Security critical software clearly isn't engineered in the same way as a new social media app. Bugs are easily reverted in a new social media app.On top of that we aren't just dealing with security critical software. One of the most important objectives is to keep all the nodes on the network in consensus. Introducing a consensus change before we are comfortable there is community consensus for it is a massive effective bug in itself. The network can split in multiple ways e.g. part of the network disagrees on whether to activate the consensus change, part of the network disagrees on how to resist that consensus change, part of the network disagrees on how to activate that consensus change etc > A consensus change is extremely hard to revert and probably requires a hard fork, a level of central coordination we generally attempt to avoid and a speed of deployment that we also attempt to avoid. This seems to assert the idea that soft forks are all the same: they are not. For instance a soft fork, lowering the block subsidy is completely different than changing the semantics of an OP_NOP to have semantics that may reject a subset of the witnesses that attest to the transactions permissibility. As a result, reversion means two entirely different things in these contexts. While a strict reversion of both soft forks is by definition a hard fork, the requirement of reversion as a result of undesired behavior is not the same. In the case of opcodes, there is almost never a requirement to revert it. If you don't like the way the opcodes behave, then you just don't use them. If you don't like the reduction of the block subsidy, well that's a much bigger problem. I make this point to elucidate the idea that we cannot treat SoftForks=E2= =84=A2 as a single monolithic idea. Perhaps we need to come up with better terminology to be specific about what each fork actually is. The soft vs. hard distinction is a critical one but it is not enough and treating soft forks that are noninvasive such as OP_NOP tightenings. This has been proposed before [1], and while I do not necessarily think the terms cited are necessarily complete, they admit the low resolution of our current terminology. > Soft fork features can (and should) obviously be tested thoroughly on testnet, signet, custom signets, sidechains etc on a standalone basis and a bundled basis. I vehemently disagree that any consensus changes should be bundled, especially when it comes to activation parameters. When we start to bundle things, we amplify the community resources needed to do review, not reduce them. I suspect your opinion here is largely informed by your frustration with the Taproot Activation procedure that you underwent earlier this year. This is understandable. However, let me present the alternative case. If we start to bundle features, the review of the features gets significantly harder. As the Bitcoin project scales, the ability of any one developer to understand the entire codebase declines. Bundling changes reduces the number of people who are qualified to review a particular proposal, and even worse, intimidates people who may be willing and able to review logically distinct portions of the proposal, resulting in lower amounts of review overall. This will likely have the opposite effect of what you seem to desire. BIP8 and BIP9 give us the ability to have multiple independent soft forks in flight at once. Choosing to bundle them instead makes little sense when we do not have to. Bundling them will inevitably degenerate into political horse trading and everyone will be worse off for it. > part of the network disagrees on whether to activate the consensus change, part of the network disagrees on how to resist that consensus change, part of the network disagrees on how to activate that consensus change etc Disagreements, and by extension, forks are a part of Bitcoin. What is important is that they are well defined and clean. This is the reason why the mandatory signaling period exists in BIP8/9, so that clients that intend to reject the soft fork change have a very easy means of doing so in a clean break where consensus is clearly divergent. In accordance with this, consensus changes should be sequenced so that people can decide which sides of the forks they want to follow and that the economic reality can reorganize around that. If choose to bundle them, you have one of two outcomes: either consensus atomizes into a mist where people have different ideas of which subsets of a soft fork bundle they want to adopt, or what likely comes after is a reconvergence on the old client with none of the soft fork rules in place. This will lead to significantly more confusion as well given that with sufficient miner consensus some of the rules may stick anyway even if the rest of the user base reconverges on the old client. It is quite likely less damaging to consensus to have frequent but strictly sequenced soft forks so that if one of the new rules is contentious the break can happen cleanly. That said, if Core or any other client wishes to cut a release of the software with the parameters bundled into a single release, that is a significantly more palatable state of affairs, as you can still pipeline signaling and activation. However, the protocol itself adopting a tendency to activate unrelated proposals in bundles is a recipe for disaster. Respectfully, Keagan [1] https://www.truthcoin.info/blog/protocol-upgrade-terminology On Sat, Oct 16, 2021 at 12:57 PM Michael Folkson via bitcoin-dev < bitcoin-dev@lists.linuxfoundation.org> wrote: > > Interesting discussion. Correct me if I'm wrong: but putting too many > features together in one shot just can't make things harder to debug in > production if something very unexpected happens. It's a basic principle > of software engineering. > > Soft fork features can (and should) obviously be tested thoroughly on > testnet, signet, custom signets, sidechains etc on a standalone basis and= a > bundled basis. But whether or not it is a basic principle of general > software engineering kind of misses the point. Security critical software > clearly isn't engineered in the same way as a new social media app. Bugs > are easily reverted in a new social media app. A consensus change is > extremely hard to revert and probably requires a hard fork, a level of > central coordination we generally attempt to avoid and a speed of > deployment that we also attempt to avoid. On top of that we aren't just > dealing with security critical software. One of the most important > objectives is to keep all the nodes on the network in consensus. > Introducing a consensus change before we are comfortable there is communi= ty > consensus for it is a massive effective bug in itself. The network can > split in multiple ways e.g. part of the network disagrees on whether to > activate the consensus change, part of the network disagrees on how to > resist that consensus change, part of the network disagrees on how to > activate that consensus change etc > > In addition, a social media app can experiment in production whether > Feature A works, whether Feature B works or whether Feature A and B work > best together. In Bitcoin if we activate consensus Feature A, later decid= e > we want consensus Feature B but find out that by previously activating > Feature A we can't have Feature B (it is now unsafe to activate it) or it= s > design now has to be suboptimal because we have to ensure it can safely > work in the presence of Feature A we have made a mistake by activating > Feature A in the first place. Decentralized security critical consensus > changes are an emerging field in itself and really can't be treated like > any other software project. This will become universally understood I'm > sure over time. > > --Michael Folkson > Email: michaelfolkson at protonmail.com > Keybase: michaelfolkson > PGP: 43ED C999 9F85 1D40 EAF4 9835 92D6 0159 214C FEE3 > > > =E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90 Original = Message =E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90 > On Friday, October 15th, 2021 at 1:43 AM, Felipe Micaroni Lalli via > bitcoin-dev wrote: > > Interesting discussion. Correct me if I'm wrong: but putting too many > features together in one shot just can't make things harder to debug in > production if something very unexpected happens. It's a basic principle > of software engineering. > > Change. Deploy. Nothing bad happened? Change it a little more. Deployment= . > Or: Change, change, change. Deploy. Did something bad happen? What change > caused the problem? > > On Thu, Oct 14, 2021 at 8:53 PM Anthony Towns via bitcoin-dev < > bitcoin-dev@lists.linuxfoundation.org> wrote: > >> On Mon, Oct 11, 2021 at 12:12:58PM -0700, Jeremy via bitcoin-dev wrote: >> > > ... in this post I will argue against frequent soft forks with a >> single or >> > minimal >> > > set of features and instead argue for infrequent soft forks with >> batches >> > > of features. >> > I think this type of development has been discussed in the past and ha= s >> been >> > rejected. >> >> > AJ: - improvements: changes might not make everyone better off, but we >> > don't want changes to screw anyone over either -- pareto >> > improvements in economics, "first, do no harm", etc. (if we get thi= s >> > right, there's no need to make compromises and bundle multiple >> > flawed proposals so that everyone's an equal mix of happy and >> > miserable) >> >> I don't think your conclusion above matches my opinion, for what it's >> worth. >> >> If you've got two features, A and B, where the game theory is: >> >> If A happens, I'm +100, You're -50 >> If B happens, I'm -50, You're +100 >> >> then even though A+B is +50, +50, then I do think the answer should >> generally be "think harder and come up with better proposals" rather tha= n >> "implement A+B as a bundle that makes us both +50". >> >> _But_ if the two features are more like: >> >> If C happens, I'm +100, You're +/- 0 >> If D happens, I'm +/- 0, You're +100 >> >> then I don't have a problem with bundling them together as a single >> simultaneous activation of both C and D. >> >> Also, you can have situations where things are better together, >> that is: >> >> If E happens, we're both at +100 >> If F happens, we're both at +50 >> If E+F both happen, we're both at +9000 >> >> In general, I think combining proposals when the combination is better >> than the individual proposals were is obviously good; and combining >> related proposals into a single activation can be good if it is easier >> to think about the ideas as a set. >> >> It's only when you'd be rejecting the proposal on its own merits that >> I think combining it with others is a bad idea in principle. >> >> For specific examples, we bundled schnorr, Taproot, MAST, OP_SUCCESSx >> and CHECKSIGADD together because they do have synergies like that; we >> didn't bundle ANYPREVOUT and graftroot despite the potential synergies >> because those features needed substantially more study. >> >> The nulldummy soft-fork (bip 147) was deployed concurrently with >> the segwit soft-fork (bip 141, 143), but I don't think there was any >> particular synergy or need for those things to be combined, it just >> reduced the overhead of two sets of activation signalling to one. >> >> Note that the implementation code for nulldummy had already been merged >> and were applied as relay policy well before activation parameters were >> defined (May 2014 via PR#3843 vs Sep 2016 for PR#8636) let alone becomin= g >> an active soft fork. >> >> Cheers, >> aj >> >> _______________________________________________ >> bitcoin-dev mailing list >> bitcoin-dev@lists.linuxfoundation.org >> https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev >> > > _______________________________________________ > bitcoin-dev mailing list > bitcoin-dev@lists.linuxfoundation.org > https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev > --00000000000044554e05d4688530 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
>=C2=A0=C2=A0But whether or not it is a basic principle of= general software engineering kind of misses the point. Security critical s= oftware clearly isn't engineered in the same way as a new social media = app. Bugs are easily reverted in a new social media app.On top of that we a= ren't just dealing with security critical software. One of the most imp= ortant objectives is to keep all the nodes on the network in consensus. Int= roducing a consensus change before we are comfortable there is community co= nsensus for it is a massive effective bug in itself. The network can split = in multiple ways e.g. part of the network disagrees on whether to activate = the consensus change, part of the network disagrees on how to resist that c= onsensus change, part of the network disagrees on how to activate that cons= ensus change etc

>=C2=A0=C2=A0A consensus change is extremely= hard to revert and probably requires a hard fork, a level of central coord= ination we generally attempt to avoid and a speed of deployment that we als= o attempt to avoid.

<= /div>
This seems to assert the= idea that soft forks are all the same: they are not. For instance a soft f= ork, lowering the block subsidy is completely different than changing the s= emantics of an OP_NOP to have semantics that may reject a subset of the wit= nesses that attest to the transactions permissibility. As a result, reversi= on means two entirely different things in these contexts. While a strict re= version of both soft forks is by definition a hard fork, the requirement of= reversion as a result of undesired behavior is not the same. In the case o= f opcodes, there is almost never a requirement to revert it. If you don'= ;t like the way the opcodes behave, then you just don't use them. If yo= u don't like the reduction of the block subsidy, well that's a much= bigger problem.

I make this point to eluci= date the idea that we cannot treat SoftForks=E2=84=A2 as a single monolithi= c idea. Perhaps we need to come up with better terminology to be specific a= bout what each fork actually is. The soft vs. hard distinction is a critica= l one but it is not enough and treating soft forks that are noninvasive suc= h as OP_NOP tightenings. This has been proposed before [1], and while I do = not necessarily think the terms cited are necessarily complete, they admit = the low resolution of our current terminology.

> Soft fork features can (and should) obviously be tested thor= oughly on testnet, signet, custom signets, sidechains etc on a standalone b= asis and a bundled basis.

I vehemently disa= gree that any consensus changes should be bundled, especially when it comes= to activation parameters. When we start to bundle things, we amplify the c= ommunity resources needed to do review, not reduce them. I suspect your opi= nion here is largely informed by your frustration with the Taproot Activati= on procedure that you underwent earlier this year. This is understandable. = However, let me present the alternative case. If we start to bundle feature= s, the review of the features gets significantly harder. As the Bitcoin pro= ject scales, the ability of any one developer to understand the entire code= base declines. Bundling changes reduces the number of people who are qualif= ied to review a particular proposal, and even worse, intimidates people who= may be willing and able to review logically distinct portions of the propo= sal, resulting in lower amounts of review overall. This will likely have th= e opposite effect of what you seem to desire. BIP8 and BIP9 give us the abi= lity to have multiple independent soft forks in flight at once. Choosing to= bundle them instead makes little sense when we do not have to. Bundling th= em will inevitably degenerate into political horse trading and everyone wil= l be worse off for it.
<= br>
> part of the net= work disagrees on whether to activate the consensus change, part of the net= work disagrees on how to resist that consensus change, part of the network = disagrees on how to activate that consensus change etc

Disagreements, and by extension, forks are a part of Bitcoin. W= hat is important is that they are well defined and clean. This is the reaso= n why the mandatory signaling period exists in BIP8/9, so that clients that= intend to reject the soft fork change have a very easy means of doing so i= n a clean break where consensus is clearly divergent. In accordance with th= is, consensus changes should be sequenced so that people can decide which s= ides of the forks they want to follow and that the economic reality can reo= rganize around that. If choose to bundle them, you have one of two outcomes= : either consensus atomizes into a mist where people have different ideas o= f which subsets of a soft fork bundle they want to adopt, or what likely co= mes after is a reconvergence on the old client with none of the soft fork r= ules in place. This will lead to significantly more confusion as well given= that with sufficient miner consensus some of the rules may stick anyway ev= en if the rest of the user base reconverges on the old client.

It is quite likely less damaging to consensus to have f= requent but strictly sequenced soft forks so that if one of the new rules i= s contentious the break can happen cleanly. That said, if Core or any other= client wishes to cut a release of the software with the parameters bundled= into a single release, that is a significantly=C2=A0more palatable state o= f affairs, as you can still pipeline signaling and activation. However, the= protocol itself adopting a tendency to activate unrelated proposals in bun= dles is a recipe for disaster.


Respectfully,
Keagan

=

On Sat, Oct 16, 2= 021 at 12:57 PM Michael Folkson via bitcoin-dev <bitcoin-dev@lists.linuxfoundation.org= > wrote:
> Interesting discussion.=C2= =A0Correct me if I'm wrong: but putting too many features togeth= er in one shot just can't make things harder to debug in production if = something very unexpected happens.=C2=A0It's a basic principle of softwar= e engineering.

Soft fork features can (and should) o= bviously be tested thoroughly on testnet, signet, custom signets, sidechain= s etc on a standalone basis and a bundled basis. But whether or not it is a= basic principle of general software engineering kind of misses the point. = Security critical software clearly isn't engineered in the same way as = a new social media app. Bugs are easily reverted in a new social media app.= A consensus change is extremely hard to revert and probably requires a har= d fork, a level of central coordination we generally attempt to avoid and a= speed of deployment that we also attempt to avoid. On top of that we aren&= #39;t just dealing with security critical software. One of the most importa= nt objectives is to keep all the nodes on the network in consensus. Introdu= cing a consensus change before we are comfortable there is community consen= sus for it is a massive effective bug in itself. The network can split in m= ultiple ways e.g. part of the network disagrees on whether to activate the = consensus change, part of the network disagrees on how to resist that conse= nsus change, part of the network disagrees on how to activate that consensu= s change etc

In add= ition, a social media app can experiment in production whether Feature A wo= rks, whether Feature B works or whether Feature A and B work best together.= In Bitcoin if we activate consensus Feature A, later decide we want consen= sus Feature B but find out that by previously activating Feature A we can&#= 39;t have Feature B (it is now unsafe to activate it) or its design now has= to be suboptimal because we have to ensure it can safely work in the prese= nce of Feature A we have made a mistake by activating Feature A in the firs= t place. Decentralized security critical consensus changes are an emerging = field in itself and really can't be treated like any other software pro= ject. This will become universally understood I'm sure over time.

=
--
Michael Folkson
Email: michaelfolkson at protonmail.com
Keybase: michaelfolkson
PGP:=C2=A043ED C999 9F85 1D40 EAF4 9835 92D6 0159 214C FEE3
<= br>
=E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90 Ori= ginal Message =E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80=90=E2=80= =90
On Friday, October 15th, 2021 at 1:43 AM, Felipe Micaroni Lalli via= bitcoin-dev <bitcoin-dev@lists.linuxfoundation.org> wrote:
Interesting discussion. Correct me if I'm wrong: but pu= tting too many features together in one shot just can't make things har= der to debug in production if something very unexpected happens. It's a basic principle of software engineering.
<= span>
Change. Deploy. Nothing bad happened? <= span>Change it a little more. Deployment.
Or: Change, change, change. Deploy. Did something bad happen? What change ca= used the problem?

On Thu, Oc= t 14, 2021 at 8:53 PM Anthony Towns via bitcoin-dev <bitcoin-dev@lists.linuxfoundation.org> wrote:
<= /div>
On Mon, Oct 11, 2021= at 12:12:58PM -0700, Jeremy via bitcoin-dev wrote:
> > ...=C2=A0in this post I will argue against frequent soft forks wi= th a single or
> minimal
> > set of features and instead argue for infrequent soft forks with = batches
> > of features.
> I think this type of development has been discussed in the past and ha= s been
> rejected.

> AJ:=C2=A0- improvements: changes might not make everyone better off, b= ut we
> =C2=A0 =C2=A0don't want changes to screw anyone over either -- par= eto
> =C2=A0 =C2=A0improvements in economics, "first, do no harm",= etc. (if we get this
> =C2=A0 =C2=A0right, there's no need to make compromises and bundle= multiple
> =C2=A0 =C2=A0flawed proposals so that everyone's an equal mix of h= appy and
> =C2=A0 =C2=A0miserable)

I don't think your conclusion above matches my opinion, for what it'= ;s
worth.

If you've got two features, A and B, where the game theory is:

=C2=A0If A happens, I'm +100, You're -50
=C2=A0If B happens, I'm -50, You're +100

then even though A+B is +50, +50, then I do think the answer should
generally be "think harder and come up with better proposals" rat= her than
"implement A+B as a bundle that makes us both +50".

_But_ if the two features are more like:

=C2=A0 If C happens, I'm +100, You're +/- 0
=C2=A0 If D happens, I'm +/- 0, You're +100

then I don't have a problem with bundling them together as a single
simultaneous activation of both C and D.

Also, you can have situations where things are better together,
that is:

=C2=A0 If E happens, we're both at +100
=C2=A0 If F happens, we're both at +50
=C2=A0 If E+F both happen, we're both at +9000

In general, I think combining proposals when the combination is better
than the individual proposals were is obviously good; and combining
related proposals into a single activation can be good if it is easier
to think about the ideas as a set.

It's only when you'd be rejecting the proposal on its own merits th= at
I think combining it with others is a bad idea in principle.

For specific examples, we bundled schnorr, Taproot, MAST, OP_SUCCESSx
and CHECKSIGADD together because they do have synergies like that; we
didn't bundle ANYPREVOUT and graftroot despite the potential synergies<= br> because those features needed substantially more study.

The nulldummy soft-fork (bip 147) was deployed concurrently with
the segwit soft-fork (bip 141, 143), but I don't think there was any particular synergy or need for those things to be combined, it just
reduced the overhead of two sets of activation signalling to one.

Note that the implementation code for nulldummy had already been merged
and were applied as relay policy well before activation parameters were
defined (May 2014 via PR#3843 vs Sep 2016 for PR#8636) let alone becoming an active soft fork.

Cheers,
aj

_______________________________________________
bitcoin-dev mailing list
bitcoin-dev@lists.linuxfoundation.org<= /a>
https://lists.linuxf= oundation.org/mailman/listinfo/bitcoin-dev

_______________________________________________
bitcoin-dev mailing list
= bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mail= man/listinfo/bitcoin-dev
--00000000000044554e05d4688530--