* [Bitcoin-development] Small update to BIP 62 @ 2014-07-18 15:14 Pieter Wuille 2014-07-18 15:39 ` Mike Hearn ` (2 more replies) 0 siblings, 3 replies; 19+ messages in thread From: Pieter Wuille @ 2014-07-18 15:14 UTC (permalink / raw) To: Bitcoin Dev Hi all, I've sent a pull request to make a small change to BIP 62 (my anti-malleability proposal) which is still a draft; see: * https://github.com/bitcoin/bips/pull/90 (the request) * https://github.com/sipa/bips/blob/bip62up/bip-0062.mediawiki (the result) It makes two of the 7 new rules mandatory in new blocks, even for old-style transactions. Both are already non-standard since 0.8.0, and have no use cases in my opinion. The reason for this change is dropping the requirement for signature verification engines to be bug-for-bug compatible with OpenSSL (which supports many non-standard encodings for signatures). Requiring strict DER compliance for signatures means any implementation just needs to support DER. Comments? -- Pieter ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-18 15:14 [Bitcoin-development] Small update to BIP 62 Pieter Wuille @ 2014-07-18 15:39 ` Mike Hearn 2014-07-18 15:45 ` Pieter Wuille 2014-07-18 20:56 ` Wladimir 2014-07-18 20:51 ` Wladimir 2014-09-01 20:48 ` Gregory Maxwell 2 siblings, 2 replies; 19+ messages in thread From: Mike Hearn @ 2014-07-18 15:39 UTC (permalink / raw) To: Pieter Wuille; +Cc: Bitcoin Dev [-- Attachment #1: Type: text/plain, Size: 548 bytes --] The rationale doesn't seem to apply to rule #4, what's so special about that one? Although I agree not having to support all of DER is nice, in practice I think all implementations do and libraries to parse DER are widespread. Given that the last time we modified tx rules without bumping version numbers we managed to break the only functioning iPhone client, I've become a big fan of backwards compatibility: seems the default choice should be to preserve compatibility over technical niceness until the old versions have been fully phased out. [-- Attachment #2: Type: text/html, Size: 608 bytes --] ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-18 15:39 ` Mike Hearn @ 2014-07-18 15:45 ` Pieter Wuille 2014-07-18 17:25 ` Pieter Wuille 2014-07-18 20:56 ` Wladimir 1 sibling, 1 reply; 19+ messages in thread From: Pieter Wuille @ 2014-07-18 15:45 UTC (permalink / raw) To: Mike Hearn; +Cc: Bitcoin Dev On Fri, Jul 18, 2014 at 5:39 PM, Mike Hearn <mike@plan99.net> wrote: > The rationale doesn't seem to apply to rule #4, what's so special about that > one? Nothing really. If it's controversial in any way, I'm fine with changing that. It's just one those things that nobody needs, nobody uses, has never been standard, and shouldn't have been possible in the first place IMHO. Given that, it's easier to just make it a consensus rule. > Although I agree not having to support all of DER is nice, in practice I > think all implementations do and libraries to parse DER are widespread. > Given that the last time we modified tx rules without bumping version > numbers we managed to break the only functioning iPhone client, I've become > a big fan of backwards compatibility: seems the default choice should be to > preserve compatibility over technical niceness until the old versions have > been fully phased out. I'm not comfortable with dropping OpenSSL-based signature parsing until we have well-defined rules about which encodings are valid. At this point I'm not even convinced we *know* about all possible ways to modify signature encodings without invalidating them. But perhaps we should investigate how many non-DER signatures still make it into blocks first... -- Pieter ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-18 15:45 ` Pieter Wuille @ 2014-07-18 17:25 ` Pieter Wuille 2014-07-18 18:10 ` Pieter Wuille 0 siblings, 1 reply; 19+ messages in thread From: Pieter Wuille @ 2014-07-18 17:25 UTC (permalink / raw) To: Mike Hearn; +Cc: Bitcoin Dev On Fri, Jul 18, 2014 at 5:45 PM, Pieter Wuille <pieter.wuille@gmail.com> wrote: > But perhaps we should investigate how many non-DER signatures still > make it into blocks first... In the last 11 blocks (4148 transactions), apparently none. -- Pieter ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-18 17:25 ` Pieter Wuille @ 2014-07-18 18:10 ` Pieter Wuille 0 siblings, 0 replies; 19+ messages in thread From: Pieter Wuille @ 2014-07-18 18:10 UTC (permalink / raw) To: Mike Hearn; +Cc: Bitcoin Dev On Fri, Jul 18, 2014 at 7:25 PM, Pieter Wuille <pieter.wuille@gmail.com> wrote: > On Fri, Jul 18, 2014 at 5:45 PM, Pieter Wuille <pieter.wuille@gmail.com> wrote: >> But perhaps we should investigate how many non-DER signatures still >> make it into blocks first... > > In the last 11 blocks (4148 transactions), apparently none. Or even in the last 389 blocks (159466 transactions). -- Pieter ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-18 15:39 ` Mike Hearn 2014-07-18 15:45 ` Pieter Wuille @ 2014-07-18 20:56 ` Wladimir 2014-07-18 22:03 ` Aaron Voisine 2014-07-19 14:46 ` Pieter Wuille 1 sibling, 2 replies; 19+ messages in thread From: Wladimir @ 2014-07-18 20:56 UTC (permalink / raw) To: Mike Hearn; +Cc: Bitcoin Dev On Fri, Jul 18, 2014 at 5:39 PM, Mike Hearn <mike@plan99.net> wrote: > The rationale doesn't seem to apply to rule #4, what's so special about that > one? > 4. Non-push operations in scriptSig Any non-push operation in a scriptSig invalidates it. Having non-push operations in the scriptSig is a source of malleability, as there can be multiple sequences of opcodes that evaluate to the same result. Wladimir ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-18 20:56 ` Wladimir @ 2014-07-18 22:03 ` Aaron Voisine 2014-07-19 1:28 ` Gregory Maxwell 2014-07-19 14:46 ` Pieter Wuille 1 sibling, 1 reply; 19+ messages in thread From: Aaron Voisine @ 2014-07-18 22:03 UTC (permalink / raw) To: Wladimir; +Cc: Bitcoin Dev > 9. New signatures by the sender I'm not suggesting it be required, but it would be possible to mitigate this one by requiring that all signatures deterministically generate k per RFC6979. I'm using this in breadwallet. Aaron Voisine breadwallet.com On Fri, Jul 18, 2014 at 1:56 PM, Wladimir <laanwj@gmail.com> wrote: > On Fri, Jul 18, 2014 at 5:39 PM, Mike Hearn <mike@plan99.net> wrote: >> The rationale doesn't seem to apply to rule #4, what's so special about that >> one? > >> 4. Non-push operations in scriptSig Any non-push operation in a scriptSig invalidates it. > > Having non-push operations in the scriptSig is a source of > malleability, as there can be multiple sequences of opcodes that > evaluate to the same result. > > Wladimir > > ------------------------------------------------------------------------------ > Want fast and easy access to all the code in your enterprise? Index and > search up to 200,000 lines of code with a free copy of Black Duck > Code Sight - the same software that powers the world's largest code > search on Ohloh, the Black Duck Open Hub! Try it now. > http://p.sf.net/sfu/bds > _______________________________________________ > Bitcoin-development mailing list > Bitcoin-development@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/bitcoin-development ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-18 22:03 ` Aaron Voisine @ 2014-07-19 1:28 ` Gregory Maxwell 2014-07-19 4:38 ` Aaron Voisine 0 siblings, 1 reply; 19+ messages in thread From: Gregory Maxwell @ 2014-07-19 1:28 UTC (permalink / raw) To: Aaron Voisine; +Cc: Bitcoin Dev On Fri, Jul 18, 2014 at 3:03 PM, Aaron Voisine <voisine@gmail.com> wrote: >> 9. New signatures by the sender > > I'm not suggesting it be required, but it would be possible to > mitigate this one by requiring that all signatures deterministically > generate k per RFC6979. I'm using this in breadwallet. Nope. Your homework assignment is to explain why. :) ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-19 1:28 ` Gregory Maxwell @ 2014-07-19 4:38 ` Aaron Voisine 2014-07-19 6:56 ` Gregory Maxwell 0 siblings, 1 reply; 19+ messages in thread From: Aaron Voisine @ 2014-07-19 4:38 UTC (permalink / raw) To: Gregory Maxwell; +Cc: Bitcoin Dev Well, you could always create a transaction with a different signature hash, say, by changing something trivial like nLockTime, or changing the order of inputs or outputs. Is that what you're talking about? Or is there some sophistry I'm ignorant of having to do with the elliptic curve math in the signature itself? Aaron Voisine breadwallet.com On Fri, Jul 18, 2014 at 6:28 PM, Gregory Maxwell <gmaxwell@gmail.com> wrote: > On Fri, Jul 18, 2014 at 3:03 PM, Aaron Voisine <voisine@gmail.com> wrote: >>> 9. New signatures by the sender >> >> I'm not suggesting it be required, but it would be possible to >> mitigate this one by requiring that all signatures deterministically >> generate k per RFC6979. I'm using this in breadwallet. > > Nope. > > Your homework assignment is to explain why. :) ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-19 4:38 ` Aaron Voisine @ 2014-07-19 6:56 ` Gregory Maxwell 2014-07-19 8:34 ` Aaron Voisine 2014-07-19 19:08 ` Aaron Voisine 0 siblings, 2 replies; 19+ messages in thread From: Gregory Maxwell @ 2014-07-19 6:56 UTC (permalink / raw) To: Aaron Voisine; +Cc: Bitcoin Dev On Fri, Jul 18, 2014 at 9:38 PM, Aaron Voisine <voisine@gmail.com> wrote: > Well, you could always create a transaction with a different signature > hash, say, by changing something trivial like nLockTime, or changing > the order of inputs or outputs. Is that what you're talking about? Or > is there some sophistry I'm ignorant of having to do with the elliptic > curve math in the signature itself? No, though thats true too. I was talking about the properties of the DSA nonce: An attacker is not obligated to follow your protocol unless you can prevent him. You can _say_ use derandomized DSA all you like, but he can just not do so, there is no (reasonable) way to prove you're using a particular nonce generation scheme without revealing the private key in the process. The verifier cannot know the nonce or he can trivially recover your private key thus he can't just repeat the computation (well, plus if you're using RFC6979 the computation includes the private key), so short of a very fancy ZKP (stuff at the forefront of cryptographic/computer science) or precommiting to a nonce per public key (e.g. single use public keys), you cannot control how a DSA nonce was generated in the verifier in a way that would prevent equivalent but not identical signatures. (I believe there was some P.O.S. altcoin that was vulnerable because of precisely the above too— thinking specifying a deterministic signer would prevent someone from grinding signatures to improve their mining odds... there are signature systems which are naturally randomness-free: most hash based signatures and pairing short signatures are two examples that come to mind... but not DSA, schnorr, or any of their derivatives). ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-19 6:56 ` Gregory Maxwell @ 2014-07-19 8:34 ` Aaron Voisine 2014-07-19 19:08 ` Aaron Voisine 1 sibling, 0 replies; 19+ messages in thread From: Aaron Voisine @ 2014-07-19 8:34 UTC (permalink / raw) To: Gregory Maxwell; +Cc: Bitcoin Dev Ah, good point. For some reason I was thinking the k value was generated only from the hash being signed, but it's derived from both the private key and the hash, so as you say there's no way for the verifier to tell if the scheme is being followed. Aaron Voisine breadwallet.com On Fri, Jul 18, 2014 at 11:56 PM, Gregory Maxwell <gmaxwell@gmail.com> wrote: > On Fri, Jul 18, 2014 at 9:38 PM, Aaron Voisine <voisine@gmail.com> wrote: >> Well, you could always create a transaction with a different signature >> hash, say, by changing something trivial like nLockTime, or changing >> the order of inputs or outputs. Is that what you're talking about? Or >> is there some sophistry I'm ignorant of having to do with the elliptic >> curve math in the signature itself? > > No, though thats true too. I was talking about the properties of the DSA nonce: > > An attacker is not obligated to follow your protocol unless you can > prevent him. You can _say_ use derandomized DSA all you like, but he > can just not do so, there is no (reasonable) way to prove you're using > a particular nonce generation scheme without revealing the private key > in the process. The verifier cannot know the nonce or he can trivially > recover your private key thus he can't just repeat the computation > (well, plus if you're using RFC6979 the computation includes the > private key), so short of a very fancy ZKP (stuff at the forefront of > cryptographic/computer science) or precommiting to a nonce per public > key (e.g. single use public keys), you cannot control how a DSA nonce > was generated in the verifier in a way that would prevent equivalent > but not identical signatures. > > (I believe there was some P.O.S. altcoin that was vulnerable because > of precisely the above too— thinking specifying a deterministic signer > would prevent someone from grinding signatures to improve their mining > odds... there are signature systems which are naturally > randomness-free: most hash based signatures and pairing short > signatures are two examples that come to mind... but not DSA, schnorr, > or any of their derivatives). ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-19 6:56 ` Gregory Maxwell 2014-07-19 8:34 ` Aaron Voisine @ 2014-07-19 19:08 ` Aaron Voisine 1 sibling, 0 replies; 19+ messages in thread From: Aaron Voisine @ 2014-07-19 19:08 UTC (permalink / raw) To: Gregory Maxwell; +Cc: Bitcoin Dev Thanks g.maxwell, your explanation of *why* you can't just generate k in a way that the verifier can duplicate is really helpful. This also servers as a great illustration why engineers should never try to designing their own crypto protocols! I knew enough to know not try that at least. Aaron Voisine breadwallet.com On Fri, Jul 18, 2014 at 11:56 PM, Gregory Maxwell <gmaxwell@gmail.com> wrote: > On Fri, Jul 18, 2014 at 9:38 PM, Aaron Voisine <voisine@gmail.com> wrote: >> Well, you could always create a transaction with a different signature >> hash, say, by changing something trivial like nLockTime, or changing >> the order of inputs or outputs. Is that what you're talking about? Or >> is there some sophistry I'm ignorant of having to do with the elliptic >> curve math in the signature itself? > > No, though thats true too. I was talking about the properties of the DSA nonce: > > An attacker is not obligated to follow your protocol unless you can > prevent him. You can _say_ use derandomized DSA all you like, but he > can just not do so, there is no (reasonable) way to prove you're using > a particular nonce generation scheme without revealing the private key > in the process. The verifier cannot know the nonce or he can trivially > recover your private key thus he can't just repeat the computation > (well, plus if you're using RFC6979 the computation includes the > private key), so short of a very fancy ZKP (stuff at the forefront of > cryptographic/computer science) or precommiting to a nonce per public > key (e.g. single use public keys), you cannot control how a DSA nonce > was generated in the verifier in a way that would prevent equivalent > but not identical signatures. > > (I believe there was some P.O.S. altcoin that was vulnerable because > of precisely the above too— thinking specifying a deterministic signer > would prevent someone from grinding signatures to improve their mining > odds... there are signature systems which are naturally > randomness-free: most hash based signatures and pairing short > signatures are two examples that come to mind... but not DSA, schnorr, > or any of their derivatives). ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-18 20:56 ` Wladimir 2014-07-18 22:03 ` Aaron Voisine @ 2014-07-19 14:46 ` Pieter Wuille 1 sibling, 0 replies; 19+ messages in thread From: Pieter Wuille @ 2014-07-19 14:46 UTC (permalink / raw) To: Wladimir J. van der Laan; +Cc: Bitcoin Dev [-- Attachment #1: Type: text/plain, Size: 887 bytes --] On Jul 18, 2014 4:56 PM, "Wladimir" <laanwj@gmail.com> wrote: > > On Fri, Jul 18, 2014 at 5:39 PM, Mike Hearn <mike@plan99.net> wrote: > > The rationale doesn't seem to apply to rule #4, what's so special about that > > one? > > > 4. Non-push operations in scriptSig Any non-push operation in a scriptSig invalidates it. > > Having non-push operations in the scriptSig is a source of > malleability, as there can be multiple sequences of opcodes that > evaluate to the same result. Well yes, but that is true for each of the rules and is already covered by the previous specification in BIP62. Making it mandatory even for old transaction does not really protect much against malleability as there are several other sources of malleability that cannot be made mandatory in old transactions left. The reason for including #4 is just "allowing this does not benefit anyone". -- Pieter [-- Attachment #2: Type: text/html, Size: 1167 bytes --] ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-18 15:14 [Bitcoin-development] Small update to BIP 62 Pieter Wuille 2014-07-18 15:39 ` Mike Hearn @ 2014-07-18 20:51 ` Wladimir 2014-09-01 20:48 ` Gregory Maxwell 2 siblings, 0 replies; 19+ messages in thread From: Wladimir @ 2014-07-18 20:51 UTC (permalink / raw) To: Pieter Wuille; +Cc: Bitcoin Dev On Fri, Jul 18, 2014 at 5:14 PM, Pieter Wuille <pieter.wuille@gmail.com> wrote: > Hi all, > > I've sent a pull request to make a small change to BIP 62 (my > anti-malleability proposal) which is still a draft; see: > * https://github.com/bitcoin/bips/pull/90 (the request) > * https://github.com/sipa/bips/blob/bip62up/bip-0062.mediawiki (the result) > > It makes two of the 7 new rules mandatory in new blocks, even for > old-style transactions. Both are already non-standard since 0.8.0, and > have no use cases in my opinion. Looks good to me. > The reason for this change is dropping the requirement for signature > verification engines to be bug-for-bug compatible with OpenSSL (which > supports many non-standard encodings for signatures). Requiring strict > DER compliance for signatures means any implementation just needs to > support DER. This is certainly a good thing. Not even OpenSSL is guaranteed to be bug-for-bug compatible with its own prior versions forever, so better to strictly define what is allowed. Wladimir ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-07-18 15:14 [Bitcoin-development] Small update to BIP 62 Pieter Wuille 2014-07-18 15:39 ` Mike Hearn 2014-07-18 20:51 ` Wladimir @ 2014-09-01 20:48 ` Gregory Maxwell 2014-09-03 16:34 ` Pieter Wuille 2 siblings, 1 reply; 19+ messages in thread From: Gregory Maxwell @ 2014-09-01 20:48 UTC (permalink / raw) To: Pieter Wuille; +Cc: Bitcoin Dev On Fri, Jul 18, 2014 at 8:14 AM, Pieter Wuille <pieter.wuille@gmail.com> wrote: > Hi all, > > I've sent a pull request to make a small change to BIP 62 (my > anti-malleability proposal) which is still a draft; see: > * https://github.com/bitcoin/bips/pull/90 (the request) > * https://github.com/sipa/bips/blob/bip62up/bip-0062.mediawiki (the result) > > It makes two of the 7 new rules mandatory in new blocks, even for > old-style transactions. Both are already non-standard since 0.8.0, and > have no use cases in my opinion. > > The reason for this change is dropping the requirement for signature > verification engines to be bug-for-bug compatible with OpenSSL (which > supports many non-standard encodings for signatures). Requiring strict > DER compliance for signatures means any implementation just needs to > support DER. Not related to this change but the definition of rule 4 may not be sufficiently specific— without a definition someone could reasonably reach a different conclusion about OP_1NEGATE being a "push operation", or might even decide any operation which added to the stack was a "push operation". Any particular reason to enforce 2 and 4 but not also 5? Violation of 5 is already non-standard and like 2,4 should be safely enforceable. Perhaps the rules should be reordered so that the applicable to all transactions ones are contiguous and first? > The first six and part of the seventh can be fixed by extra consensus rules. This should clarify that the scriptPubkey can still specify rules that are inherently malleable— e.g. require the input stack contain two pushes which OP_ADD to 11. Or a more elaborate one— a 1 of 2 check multisig where the pubkey not selected for signing is selected by a push in the signature. The current text seems to ignore isomorphisms of this type. ... they're not important for what the BIP is trying to achieve, but the document shouldn't cause people to not think that sort of thing exists. ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-09-01 20:48 ` Gregory Maxwell @ 2014-09-03 16:34 ` Pieter Wuille 2014-09-07 23:31 ` Pieter Wuille 0 siblings, 1 reply; 19+ messages in thread From: Pieter Wuille @ 2014-09-03 16:34 UTC (permalink / raw) To: Gregory Maxwell; +Cc: Bitcoin Dev On Mon, Sep 1, 2014 at 10:48 PM, Gregory Maxwell <gmaxwell@gmail.com> wrote: > Not related to this change but the definition of rule 4 may not be > sufficiently specific-- without a definition someone could reasonably > reach a different conclusion about OP_1NEGATE being a "push > operation", or might even decide any operation which added to the > stack was a "push operation". Good catch - I'll write an update soon. > Any particular reason to enforce 2 and 4 but not also 5? Violation of > 5 is already non-standard and like 2,4 should be safely enforceable. Perhaps we can go further, and include 6 as well? I see zero use cases for zero-padded numbers, as their interpretation is already identical to the non-padded case. I wouldn't include 1 (as it would break a large amount of wallets today), 3 (which may have a use case in more complex scripts with conditionals) or 7 (the superfluous element consumed by CHECKMULTISIG could potentially be used for something in the future). > Perhaps the rules should be reordered so that the applicable to all > transactions ones are contiguous and first? Ok. >> The first six and part of the seventh can be fixed by extra consensus rules. > > This should clarify that the scriptPubkey can still specify rules that > are inherently malleable-- e.g. require the input stack contain two > pushes which OP_ADD to 11. Or a more elaborate one-- a 1 of 2 check > multisig where the pubkey not selected for signing is selected by a > push in the signature. The current text seems to ignore isomorphisms > of this type. ... they're not important for what the BIP is trying to > achieve, but the document shouldn't cause people to not think that > sort of thing exists. I'll try to reword. -- Pieter ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-09-03 16:34 ` Pieter Wuille @ 2014-09-07 23:31 ` Pieter Wuille 2014-09-12 16:35 ` Pieter Wuille 0 siblings, 1 reply; 19+ messages in thread From: Pieter Wuille @ 2014-09-07 23:31 UTC (permalink / raw) To: Gregory Maxwell; +Cc: Bitcoin Dev On Wed, Sep 3, 2014 at 6:34 PM, Pieter Wuille <pieter.wuille@gmail.com> wrote: > On Mon, Sep 1, 2014 at 10:48 PM, Gregory Maxwell <gmaxwell@gmail.com> wrote: >> Not related to this change but the definition of rule 4 may not be >> sufficiently specific-- without a definition someone could reasonably >> reach a different conclusion about OP_1NEGATE being a "push >> operation", or might even decide any operation which added to the >> stack was a "push operation". > > Good catch - I'll write an update soon. >> Perhaps the rules should be reordered so that the applicable to all >> transactions ones are contiguous and first? > Ok. >>> The first six and part of the seventh can be fixed by extra consensus rules. >> >> This should clarify that the scriptPubkey can still specify rules that >> are inherently malleable [...] > I'll try to reword. I've sent out a new pull request (https://github.com/bitcoin/bips/pull/102/files) that: * Changes the order of the rules. * Adds more reference documentation about minimal pushes and number encodings. * Clarified that extra consensus rules cannot prevent someone from creating outputs whose spending transactions will be malleable. I haven't changed which rules are mandatory in v3, so this is a pure clarification & reorganization of the text. Any comments? -- Pieter ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-09-07 23:31 ` Pieter Wuille @ 2014-09-12 16:35 ` Pieter Wuille 2014-09-13 22:45 ` Pieter Wuille 0 siblings, 1 reply; 19+ messages in thread From: Pieter Wuille @ 2014-09-12 16:35 UTC (permalink / raw) To: Gregory Maxwell; +Cc: Bitcoin Dev On Mon, Sep 8, 2014 at 1:31 AM, Pieter Wuille <pieter.wuille@gmail.com> wrote: > I've sent out a new pull request > (https://github.com/bitcoin/bips/pull/102/files) that: > * Changes the order of the rules. > * Adds more reference documentation about minimal pushes and number encodings. > * Clarified that extra consensus rules cannot prevent someone from > creating outputs whose spending transactions will be malleable. > > I haven't changed which rules are mandatory in v3, so this is a pure > clarification & reorganization of the text. Changes: https://github.com/bitcoin/bips/pull/102/files Gregory, Jeff: does this address your concerns? Others: comments? -- Pieter ^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [Bitcoin-development] Small update to BIP 62 2014-09-12 16:35 ` Pieter Wuille @ 2014-09-13 22:45 ` Pieter Wuille 0 siblings, 0 replies; 19+ messages in thread From: Pieter Wuille @ 2014-09-13 22:45 UTC (permalink / raw) To: Gregory Maxwell; +Cc: Bitcoin Dev On Fri, Sep 12, 2014 at 6:35 PM, Pieter Wuille <pieter.wuille@gmail.com> wrote: > Changes: https://github.com/bitcoin/bips/pull/102/files > > Gregory, Jeff: does this address your concerns? > Others: comments? I've made another change in the PR, as language about strictly only compressed or uncompressed public keys was missing; please have a look. -- Pieter ^ permalink raw reply [flat|nested] 19+ messages in thread
end of thread, other threads:[~2014-09-13 22:45 UTC | newest] Thread overview: 19+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2014-07-18 15:14 [Bitcoin-development] Small update to BIP 62 Pieter Wuille 2014-07-18 15:39 ` Mike Hearn 2014-07-18 15:45 ` Pieter Wuille 2014-07-18 17:25 ` Pieter Wuille 2014-07-18 18:10 ` Pieter Wuille 2014-07-18 20:56 ` Wladimir 2014-07-18 22:03 ` Aaron Voisine 2014-07-19 1:28 ` Gregory Maxwell 2014-07-19 4:38 ` Aaron Voisine 2014-07-19 6:56 ` Gregory Maxwell 2014-07-19 8:34 ` Aaron Voisine 2014-07-19 19:08 ` Aaron Voisine 2014-07-19 14:46 ` Pieter Wuille 2014-07-18 20:51 ` Wladimir 2014-09-01 20:48 ` Gregory Maxwell 2014-09-03 16:34 ` Pieter Wuille 2014-09-07 23:31 ` Pieter Wuille 2014-09-12 16:35 ` Pieter Wuille 2014-09-13 22:45 ` Pieter Wuille
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox