An attack still shuts down useful tx replacement though. For instance in
the adjusting payments example an attacker sets up a legit adjusting
payment channel, does a bunch of adjustments, and then launches their
attack. They broadcast enough adjustments that their adjustment session
looks like part of an attack, and then don't have to pay for the full
adjusted amount.
It's *easily* DoSable, not trivially.
You would need some way of determining which input was responsible for areplacement though - I can't think of an obvious way to within the
current transaction format, but I haven't thought hard about it yet.
How exactly do you envision replacement working with non-final ==
non-standard anyway?
If he's reasonable about the scope, IE just a initial implementation forfurther evaluation, I figure it's about two days work.