From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from sog-mx-1.v43.ch3.sourceforge.com ([172.29.43.191] helo=mx.sourceforge.net) by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1YscWc-00040Z-65 for bitcoin-development@lists.sourceforge.net; Wed, 13 May 2015 19:41:02 +0000 Received-SPF: pass (sog-mx-1.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.214.170 as permitted sender) client-ip=209.85.214.170; envelope-from=pieter.wuille@gmail.com; helo=mail-ob0-f170.google.com; Received: from mail-ob0-f170.google.com ([209.85.214.170]) by sog-mx-1.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1YscWa-0002vx-Ge for bitcoin-development@lists.sourceforge.net; Wed, 13 May 2015 19:41:02 +0000 Received: by obfe9 with SMTP id e9so37844211obf.1 for ; Wed, 13 May 2015 12:40:55 -0700 (PDT) MIME-Version: 1.0 X-Received: by 10.60.97.6 with SMTP id dw6mr418902oeb.71.1431546055034; Wed, 13 May 2015 12:40:55 -0700 (PDT) Received: by 10.60.94.36 with HTTP; Wed, 13 May 2015 12:40:54 -0700 (PDT) In-Reply-To: References: Date: Wed, 13 May 2015 12:40:54 -0700 Message-ID: From: Pieter Wuille To: Christian Decker Content-Type: multipart/alternative; boundary=089e011618b2170ece0515fbca51 X-Spam-Score: -0.6 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (pieter.wuille[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 1.0 HTML_MESSAGE BODY: HTML included in message -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1YscWa-0002vx-Ge Cc: Bitcoin Dev Subject: Re: [Bitcoin-development] [BIP] Normalized Transaction IDs X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 13 May 2015 19:41:02 -0000 --089e011618b2170ece0515fbca51 Content-Type: text/plain; charset=ISO-8859-1 On Wed, May 13, 2015 at 12:14 PM, Christian Decker < decker.christian@gmail.com> wrote: > > On Wed, May 13, 2015 at 8:40 PM Pieter Wuille > wrote: > >> On Wed, May 13, 2015 at 11:04 AM, Christian Decker < >> decker.christian@gmail.com> wrote: >> >>> If the inputs to my transaction have been long confirmed I can be >>> reasonably safe in assuming that the transaction hash does not change >>> anymore. It's true that I have to be careful not to build on top of >>> transactions that use legacy references to transactions that are >>> unconfirmed or have few confirmations, however that does not invalidate the >>> utility of the normalized transaction IDs. >>> >> >> Sufficient confirmations help of course, but make systems like this less >> useful for more complex interactions where you have multiple unconfirmed >> transactions waiting on each other. I think being able to rely on this >> problem being solved unconditionally is what makes the proposal attractive. >> For the simple cases, see BIP62. >> > > If we are building a long running contract using a complex chain of > transactions, or multiple transactions that depend on each other, there is > no point in ever using any malleable legacy transaction IDs and I would > simply stop cooperating if you tried. I don't think your argument applies. > If we build our contract using only normalized transaction IDs there is no > way of suffering any losses due to malleability. > That's correct as long as you stay within your contract, but you likely want compatibility with other software, without waiting an age before and after your contract settles on the chain. It's a weaker argument, though, I agree. I remember reading about the SIGHASH proposal somewhere. It feels really >>> hackish to me: It is a substantial change to the way signatures are >>> verified, I cannot really see how this is a softfork if clients that did >>> not update are unable to verify transactions using that SIGHASH Flag and it >>> is adding more data (the normalized hash) to the script, which has to be >>> stored as part of the transaction. It may be true that a node observing >>> changes in the input transactions of a transaction using this flag could >>> fix the problem, however it requires the node's intervention. >>> >> >> I think you misunderstand the idea. This is related, but orthogonal to >> the ideas about extended the sighash flags that have been discussed here >> before. >> >> All it's doing is adding a new CHECKSIG operator to script, which, in its >> internally used signature hash, 1) removes the scriptSigs from transactions >> before hashing 2) replaces the txids in txins by their ntxid. It does not >> add any data to transactions, and it is a softfork, because it only impacts >> scripts which actually use the new CHECKSIG operator. Wallets that don't >> support signing with this new operator would not give out addresses that >> use it. >> > > In that case I don't think I heard this proposal before, and I might be > missing out :-) > So if transaction B spends an output from A, then the input from B > contains the CHECKSIG operator telling the validating client to do what > exactly? It appears that it wants us to go and fetch A, normalize it, put > the normalized hash in the txIn of B and then continue the validation? > Wouldn't that also need a mapping from the normalized transaction ID to the > legacy transaction ID that was confirmed? > There would just be an OP_CHECKAWESOMESIG, which can do anything. It can identical to how OP_CHECKSIG works now, but has a changed algorithm for its signature hash algorithm. Optionally (and likely in practice, I think), it can do various other proposed improvements, like using Schnorr signatures, having a smaller signature encoding, supporting batch validation, have extended sighash flags, ... It wouldn't fetch A and normalize it; that's impossible as you would need to go fetch all of A's dependencies too and recurse until you hit the coinbases that produced them. Instead, your UTXO set contains the normalized txid for every normal txid (which adds around 26% to the UTXO set size now), but lookups in it remain only by txid. You don't need a ntxid->txid mapping, as transactions and blocks keep referring to transactions by txid. Only the OP_CHECKAWESOMESIG operator would do the conversion, and at most once. A client that did not update still would have no clue on how to handle > these transactions, since it simply does not understand the CHECKSIG > operator. If such a transaction ends up in a block I cannot even catch up > with the network since the transaction does not validate for me. > As for every softfork, it works by redefining an OP_NOP operator, so old nodes simply consider these checksigs unconditionally valid. That does mean you don't want to use them before the consensus rule is forked in (=enforced by a majority of the hashrate), and that you suffer from the temporary security reduction that an old full node is unknowingly reduced to SPV security for these opcodes. However, as full node wallet, this problem does not affect you, as your wallet would simply not give out addresses using the new opcode (and thus, wouldn't receive coins using it), unless it was upgraded to support it. Could you provide an example of how this works? > > >> >>> Compare that to the simple and clean solution in the proposal, which >>> does not add extra data to be stored, keeps the OP_*SIG* semantics as they >>> are and where once you sign a transaction it does not have to be monitored >>> or changed in order to be valid. >>> >> >> OP_*SIG* semantics don't change here either, we're just adding a superior >> opcode (which in most ways behaves the same as the existing operators). I >> agree with the advantage of not needing to monitor transactions afterwards >> for malleated inputs, but I think you underestimate the deployment costs. >> If you want to upgrade the world (eventually, after the old index is >> dropped, which is IMHO the only point where this proposal becomes superior >> to the alternatives) to this, you're changing *every single piece of >> Bitcoin software on the planet*. This is not just changing some validation >> rules that are opt-in to use, you're fundamentally changing how >> transactions refer to each other. >> > > As I mentioned before, this is a really long term strategy, hoping to get > the cleanest and easiest solution, so that we do not further complicate the > inner workings of Bitcoin. I don't think that it is completely out of > question to eventually upgrade to use normalized transactions, after all > the average lifespan of hardware is a few years tops. > Fair enough, I definitely agree the end result is superior in this case. Also, what do blocks commit to? Do you keep using the old transaction ids >> for this? Because if you don't, any relayer on the network can invalidate a >> block (and have the receiver mark it as invalid) by changing the txids. You >> need to somehow commit to the scriptSig data in blocks still so the POW of >> a block is invalidated by changing a scriptSig. >> > > How could I change the transaction IDs if I am a relayer? The miner > decides which flavor of IDs it is adding into its merkle tree, the block > hash locks in the choice. If we saw a transaction having a valid sigScript, > it does not matter how we reference it in the block. > If the merkle tree of a block only commits to a transaction's normalized hash, that means that the block hash does not change when the scriptSig is altered. So, anyone on the network can take a random valid block, and modify its scriptSig, and the block will become invalid _without_ invalidating the block header. This means that nodes on the network will now classify that block header as having invalid transactions, and reject it. Not having the ability anymore to mark blocks as invalid opens significant DoS risks. So yes, seeing a block with valid scriptSigs is indeed a proof the transaction was legitimately authored. But the oppose is no longer true, and we need that. The correct solution is to either keep using the old full transaction ids in blocks, but ntxids everywhere else, or having some alternative means to commit to the scriptSigs inside the block (for example in the coinbase or using one of the more efficient block commitment proposals), and have that enforced as consensus rule. -- Pieter --089e011618b2170ece0515fbca51 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
On Wed, May 13, 2015 at 12:14 PM, Christian Decker <decker.christian@gmail.com> wrote:

On Wed, May 13, 2015 at 8:40 PM Pieter Wuille <pieter.wuille@gmail.com<= /a>> wrote:
If the inputs to my transaction have been long confirmed I can be reas= onably safe in assuming that the transaction hash does not change anymore. = It's true that I have to be careful not to build on top of transactions= that use legacy references to transactions that are unconfirmed or have fe= w confirmations, however that does not invalidate the utility of the normal= ized transaction IDs.=A0

Sufficient confirmations help of course, but make systems like this less = useful for more complex interactions where you have multiple unconfirmed tr= ansactions waiting on each other. I think being able to rely on this proble= m being solved unconditionally is what makes the proposal attractive. For t= he simple cases, see BIP62.
If we are building a long running contract using a comp= lex chain of transactions, or multiple transactions that depend on each oth= er, there is no point in ever using any malleable legacy transaction IDs an= d I would simply stop cooperating if you tried. I don't think your argu= ment applies. If we build our contract using only normalized transaction ID= s there is no way of suffering any losses due to malleability.
<= /div>

That's correct as long as you sta= y within your contract, but you likely want compatibility with other softwa= re, without waiting an age before and after your contract settles on the ch= ain. It's a weaker argument, though, I agree.

I remember reading about the SIGHASH proposal somewhere. It feel= s really hackish to me: It is a substantial change to the way signatures ar= e verified, I cannot really see how this is a softfork if clients that did = not update are unable to verify transactions using that SIGHASH Flag and it= is adding more data (the normalized hash) to the script, which has to be s= tored as part of the transaction. It may be true that a node observing chan= ges in the input transactions of a transaction using this flag could fix th= e problem, however it requires the node's intervention.

I think you misunderstand the id= ea. This is related, but orthogonal to the ideas about extended the sighash= flags that have been discussed here before.

All it's= doing is adding a new CHECKSIG operator to script, which, in its internall= y used signature hash, 1) removes the scriptSigs from transactions before h= ashing 2) replaces the txids in txins by their ntxid. It does not add any d= ata to transactions, and it is a softfork, because it only impacts scripts = which actually use the new CHECKSIG operator. Wallets that don't suppor= t signing with this new operator would not give out addresses that use it.<= br>

In that = case I don't think I heard this proposal before, and I might be missing= out :-)
So if transaction B spends an output from A, then the in= put from B contains the CHECKSIG operator telling the validating client to = do what exactly? It appears that it wants us to go and fetch A, normalize i= t, put the normalized hash in the txIn of B and then continue the validatio= n? Wouldn't that also need a mapping from the normalized transaction ID= to the legacy transaction ID that was confirmed?

There would just be an OP_CHECKAWESOMESIG, which c= an do anything. It can identical to how OP_CHECKSIG works now, but has a ch= anged algorithm for its signature hash algorithm. Optionally (and likely in= practice, I think), it can do various other proposed improvements, like us= ing Schnorr signatures, having a smaller signature encoding, supporting bat= ch validation, have extended sighash flags, ...

It wouldn= 't fetch A and normalize it; that's impossible as you would need to= go fetch all of A's dependencies too and recurse until you hit the coi= nbases that produced them. Instead, your UTXO set contains the normalized t= xid for every normal txid (which adds around 26% to the UTXO set size now),= but lookups in it remain only by txid.

You don't nee= d a ntxid->txid mapping, as transactions and blocks keep referring to tr= ansactions by txid. Only the OP_CHECKAWESOMESIG operator would do the conve= rsion, and at most once.

A client that did not update sti= ll would have no clue on how to handle these transactions, since it simply = does not understand the CHECKSIG operator. If such a transaction ends up in= a block I cannot even catch up with the network since the transaction does= not validate for me.

As = for every softfork, it works by redefining an OP_NOP operator, so old nodes= simply consider these checksigs unconditionally valid. That does mean you = don't want to use them before the consensus rule is forked in (=3Denfor= ced by a majority of the hashrate), and that you suffer from the temporary = security reduction that an old full node is unknowingly reduced to SPV secu= rity for these opcodes. However, as full node wallet, this problem does not= affect you, as your wallet would simply not give out addresses using the n= ew opcode (and thus, wouldn't receive coins using it), unless it was up= graded to support it.

Could you provide an example of ho= w this works?=A0
=A0

Compare that to the simple and clean solution in the= proposal, which does not add extra data to be stored, keeps the OP_*SIG* s= emantics as they are and where once you sign a transaction it does not have= to be monitored or changed in order to be valid.
<= div>
OP_*SIG* semantics don't change here e= ither, we're just adding a superior opcode (which in most ways behaves = the same as the existing operators). I agree with the advantage of not need= ing to monitor transactions afterwards for malleated inputs, but I think yo= u underestimate the deployment costs. If you want to upgrade the world (eve= ntually, after the old index is dropped, which is IMHO the only point where= this proposal becomes superior to the alternatives) to this, you're ch= anging *every single piece of Bitcoin software on the planet*. This is not = just changing some validation rules that are opt-in to use, you're fund= amentally changing how transactions refer to each other.

As I mentioned before, thi= s is a really long term strategy, hoping to get the cleanest and easiest so= lution, so that we do not further complicate the inner workings of Bitcoin.= I don't think that it is completely out of question to eventually upgr= ade to use normalized transactions, after all the average lifespan of hardw= are is a few years tops.

= Fair enough, I definitely agree the end result is superior in this case.
Also, what do = blocks commit to? Do you keep using the old transaction ids for this? Becau= se if you don't, any relayer on the network can invalidate a block (and= have the receiver mark it as invalid) by changing the txids. You need to s= omehow commit to the scriptSig data in blocks still so the POW of a block i= s invalidated by changing a scriptSig.

How could I change the transaction IDs if I = am a relayer? The miner decides which flavor of IDs it is adding into its m= erkle tree, the block hash locks in the choice. If we saw a transaction hav= ing a valid sigScript, it does not matter how we reference it in the block.=

If the merkle tree of a = block only commits to a transaction's normalized hash, that means that = the block hash does not change when the scriptSig is altered. So, anyone on= the network can take a random valid block, and modify its scriptSig, and t= he block will become invalid _without_ invalidating the block header. This = means that nodes on the network will now classify that block header as havi= ng invalid transactions, and reject it. Not having the ability anymore to m= ark blocks as invalid opens significant DoS risks.

So yes= , seeing a block with valid scriptSigs is indeed a proof the transaction wa= s legitimately authored. But the oppose is no longer true, and we need that= . The correct solution is to either keep using the old full transaction ids= in blocks, but ntxids everywhere else, or having some alternative means to= commit to the scriptSigs inside the block (for example in the coinbase or = using one of the more efficient block commitment proposals), and have that = enforced as consensus rule.

--
Pieter

--089e011618b2170ece0515fbca51--