ZmnSCPxj [ARCHIVE] on Nostr: 📅 Original date posted:2023-04-04 📝 Original message: Good morning again ariard ...
📅 Original date posted:2023-04-04
📝 Original message:
Good morning again ariard and t-bast,
>
> For cases where the one doing splice-in is an LSP and the other side is a client of that LSP, also consider this proposal:
https://github.com/BitcoinAndLightningLayerSpecs/lsp/pull/24>
> While it is designed for 0-conf channel funding, the actual protocol is generic enough that it can be used where there is double-spend risk from an LSP, that the client wants to protect against.
> This can applied to splice-in and channel factory construction, as the protocol is simply a promise "I the LSP will do my best to get the transaction with this TXID confirmed before some future blockheight, so you the client can rest assured that even if it is unconfirmed now (0-conf) you can always rely on it being confirmed later."
Actually, given that the LSP is held liable if the TXID never confirms, and the splice TXID has as input the previous funding txo, this is actually risky for the LSP.
Even if the client has given revocation keys for all states dependent on the previous funding txo, the client can still post, and have confirmed, a revoked state.
This prevents the LSP from ever getting the splice TXID confirmed.
The client loses all its funds in the channel, but in exchange the LSP is held liable for not getting the splice TXID confirmed and the LSP reputation is destroyed.
Regards,
ZmnSCPxj
Published at
2023-06-09 13:08:30Event JSON
{
"id": "8ecdb3c2502cd87117e5f57b1b16bbf924d80ec5bc3d85d8a2a78d938c7b1677",
"pubkey": "4505072744a9d3e490af9262bfe38e6ee5338a77177b565b6b37730b63a7b861",
"created_at": 1686316110,
"kind": 1,
"tags": [
[
"e",
"6f40a6620019aa44b1fc476c680970bc66cb81a97d7ccc82553761c48e9932ab",
"",
"root"
],
[
"e",
"c00b255fd339ae9e7263fb00f49c99c69fb0cadd4ec0f493a4c1db8a76c8f374",
"",
"reply"
],
[
"p",
"4505072744a9d3e490af9262bfe38e6ee5338a77177b565b6b37730b63a7b861"
]
],
"content": "📅 Original date posted:2023-04-04\n📝 Original message:\nGood morning again ariard and t-bast,\n\n\u003e \n\u003e For cases where the one doing splice-in is an LSP and the other side is a client of that LSP, also consider this proposal: https://github.com/BitcoinAndLightningLayerSpecs/lsp/pull/24\n\u003e \n\u003e While it is designed for 0-conf channel funding, the actual protocol is generic enough that it can be used where there is double-spend risk from an LSP, that the client wants to protect against.\n\u003e This can applied to splice-in and channel factory construction, as the protocol is simply a promise \"I the LSP will do my best to get the transaction with this TXID confirmed before some future blockheight, so you the client can rest assured that even if it is unconfirmed now (0-conf) you can always rely on it being confirmed later.\"\n\nActually, given that the LSP is held liable if the TXID never confirms, and the splice TXID has as input the previous funding txo, this is actually risky for the LSP.\n\nEven if the client has given revocation keys for all states dependent on the previous funding txo, the client can still post, and have confirmed, a revoked state.\nThis prevents the LSP from ever getting the splice TXID confirmed.\nThe client loses all its funds in the channel, but in exchange the LSP is held liable for not getting the splice TXID confirmed and the LSP reputation is destroyed.\n\nRegards,\nZmnSCPxj",
"sig": "0d5bc626dd4085d3790246f2614e5346e3a6cea2625d1400bba8082af591327a781659a7ca9ab6292495be1681bd4ae1cb6c42a8629990e513e7e2c04ad4d873"
}