-
Notifications
You must be signed in to change notification settings - Fork 492
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Lightning Specification Meeting 2023/08/14 #1101
Comments
I believe there is also a plan to discuss 2-of-2 multisig in the script path for force-close (instead of nested musig). I / VLS support this because:
There may be other advantages to 2-of-2 multisig, including less crypto operations (important for embedded device signers) and reduced commit latency. In general, the use case that we support (external signers) may require additional round-trip to a remote signer and may involve under-powered signing hardware (e.g. consumer device). |
dual funding:
splicing:
mandatory feature bit stuff:
simple close:
spec clean up:
blinded path QR code shrinking:
stfu:
splicing:
attributable erros:
offers:
taproot:
|
Working on a Rust implementation of #1043, though not ready yet for new reviews. Idea to be compatible with other jamming mitigations and being usable for LSP APIs DoS. Chatted with few smart cryptographers around on the trade-off of crypto-systems, I think I’ll look to specify crypto-systems used as BIPs directly. |
(incredibly late) transcript: bitcointranscripts/bitcointranscripts#274 |
The meeting will take place on Monday 2023/08/14 at 8pm UTC (5:30am Adelaide time) on Libera Chat IRC #lightning-dev. It is open to the public.
A video link is available for higher bandwidth communication: https://meet.jit.si/Lightning-Spec-Meeting
Recently Updated Proposals / Seeking Review
This section contains changes that have been opened or updated recently and need feedback from the meeting participants.
offer
blinded paths #1099cltv_expiry
across implementations BOLT4: Specify max HTLC nLocktime for expiry_too_far #1086max_dust_htlc_exposure_msat
#919Clarifychannel_reestablish
requirements Clarifychannel_reestablish
requirements #1049 or Reworkchannel_reestablish
requirements #1051Stale Proposals
This section contains pending changes that may not need feedback from the meeting participants, unless someone explicitly asks for it during the meeting. These changes are usually waiting for implementation work to happen to drive more feedback.
Inbound fees Inbound routing fees blips#18 and Add a bLIP for backwards-compatible inbound fees blips#22Liquidity ads option_will_fund: liquidity ads #878Sign commitments at various feerates Add option to sign commitments at various feerates (FEAT 32/33) #1036Waiting for interop
This section contains changes that have been conceptually ACKed and are waiting for at least two implementations to fully interoperate.
They most likely don't need to be covered during the meeting, unless someone asks for updates.
Don't force close until error is received afterchannel_reestablish
Nodes shouldn't publish their commitment when receiving outdatedchannel_reestablish
#934Websocket transport websocket address type: allow transport over RFC6455 #891 or Websocket address type: attempt 2 #1068Long Term Updates
This section contains long-term changes that need review, but require a substantial implementation effort.
Channel jamming draft: Staking Credentials token issuance/redemption #1043 draft: Upfront Fees to Mitigate Channel Jamming #1052 draft: HTLC Endorsement to Mitigate Channel Jamming #1071Simplified commitment Feature 106/107: option_simplified_update. #867Peer storage backup Peer backup storage (feature 40/41/42/43) #881Hold htlcs before forwarding Add the ability to hold HTLCs before forwarding (FEAT 52/53) #989Trampoline routing Trampoline Routing (2021 edition) (Feature 56/57) #829 and Trampoline onion format (Feature 56/57) #836lnprototest (https://github.com/rustyrussell/lnprototest)The text was updated successfully, but these errors were encountered: