Anthony Towns [ARCHIVE] on Nostr: 📅 Original date posted:2019-11-06 📝 Original message: On Wed, Nov 06, 2019 at ...
📅 Original date posted:2019-11-06
📝 Original message:
On Wed, Nov 06, 2019 at 10:43:23AM +1030, Rusty Russell wrote:
> >> Rusty prepares a nonce, AAAAA and hashes it 25 times = ZZZZZ.
> >> ZmnSCPxj prepares the onion, but adds extra fields (see below).
> > It would have made more sense to me for Alice (Zmn) to generate
> > the nonce, hash it, and prepare the onion, so that the nonce is
> > revealed to Dave (Rusty) if/when the message ever actually reaches its
> > destination. Otherwise Rusty has to send AAAAA to Zmn already so that
> > Zmn can prepare the onion?
> The entire point is to pay *up-front*, though, to prevent spam.
Hmm, I'm not sure I see the point of paying upfront but not
unconditionally -- you already commit the funds as part of the HTLC,
and if you're refunding some of them, you kind-of have to keep them
reserved or you risk finalising the HTLC causing a failure because you
don't have enough msats spare to do the refund?
If you refund on routing failure, why wouldn't a spammer just add a fake
"Ezekiel" at the end of the route after Dave, so that the HTLCs always
fail and all the fees are returned?
> Bob/ZmnSCPxj doesn't prepare anything in the onion. They get handed the
> last hash directly: Alice is saying "I'll pay you 50msat for each
> preimage you can give me leading to this hash".
So my example was Alice paying Dave via Bob and Carol (so Alice/Bob,
Bob/Carol, Carol/Dave being the individual channels).
What you wrote to Zmn says "Rusty decrypts the onion, reads the prepay
field: it says 14, LLLL." but Alice doesn't know anything other than
ZZZZ so can't put LLLL in the onion?
Are you using Hornet so that every intermediary can communicate a nonce
back to the source of the route? If not, "Rusty" generating the nonce
seems like you're informing Rusty that you're actually the origin of the
HTLC, and not just innocently forwarding it along; if so, it seems like
you have independent nonces at each step, rather than
AAAA/BBBB/LLLL/ZZZZ in a direct chain.
> > I'm not sure why lucky hashing should result in a discount?
> Because the PoW adds noise to the amounts, otherwise the path length is
> trivially exposed, esp in the failure case. It's weak protection
> though.
With a linear/exponential relationship you just get "half the time it's
1 unit, 25% of the time it's 2 units, 12% of the time it's 3 units", so
I don't think that's adding much noise?
> > You've only got two nonce choices -- the initial AAAA and the depth
> > that you tell Bob and Carol to hash to as steps in the route;
> No, the sphinx construction allows for grinding, that was my intent
> here. The prepay hashes are independent.
Oh, because you're also xoring with the onion packet, right, I see.
> > I think you could just make the scheme be:
> > Alice sends HTLC(k,v) + 1250 msat to Bob
> > Bob unwraps the onion and forwards HTLC(k,v) + 500 msat to Carol
> > Carol unwraps the onion and forwards HTLC(k,v) + 250 msat to Dave
> > Dave redeems the HTLC, claims an extra 300 msat and refunds 200 msat to Carol
The math here doesn't add up. Let's assume I meant:
Bob keeps 500 sat, forwards 750 sat
Carol keeps 250 sat, forwards 500 sat
Dave keeps 300 sat, refunds 200 sat
> > Carol redeems the HTLC and refunds 200 msat to Bob
> > Bob redeems the HTLC and refunds 200 msat to Alice
> >
> > If there's a failure, Alice loses the 1250 msat, and someone in the
> > path steals the funds.
> This example confuses me.
Well, that makes us even at least? :)
> So, you're charging 250msat per hop? Why is Bob taking 750? Does Carol
> now know Dave is the last hop?
No, Alice is choosing to pay 500, 250 and 300 msat to Bob, Carol and
Dave respectively, as part of setting up the onion, and picks those
numbers via some magic algo trading off privacy and cost.
> Does Alice lose everything on any routing failure?
That was my thought yeah; it seems weird to pay upfront but expect a
refund on failure -- the HTLC funds are already committed upfront and
refunded on failure.
> If so, that is strong incentive for Alice to reduce path-length privacy
> by keeping payments minimal, which I was really trying to avoid.
Assuming v is much larger than 1250msat, and 1250 msat is much lower than
the cost to Bob of losing the channel with Alice, I don't think that's
a problem. 1250msat pays for 125kB of bandwdith under your assumptions
I think?
> > Does that miss anything that all the hashing achieves?
> It does nothing if Carol is the one who can't route.
If Carol can't route, then ideally she just refunds all the money and
everyone's happy.
If Carol tries to steal, then she can keep 750 msat instead of 250 msat.
This doesn't give any way for Bob to prove Carol cheated on him though;
but Bob could just refund the 1250 msat and write the 750 msat off as a
loss of dealing with cheaters like Carol.
Cheers,
aj
Published at
2023-06-09 12:57:05Event JSON
{
"id": "eff4d91c6a6e46b96b61e5b599bb5ce199ae5bbcf13c153039c4b87cc6a56ff8",
"pubkey": "f0feda6ad58ea9f486e469f87b3b9996494363a26982b864667c5d8acb0542ab",
"created_at": 1686315425,
"kind": 1,
"tags": [
[
"e",
"0c91e21e034533f122e94b0fd3031654ae905512e27a1262e64ae8c7923a76b8",
"",
"root"
],
[
"e",
"d0d2e1864b90cd903670e1cf906ef149a66e838f00e3e71f73dd80073553e61a",
"",
"reply"
],
[
"p",
"13bd8c1c5e3b3508a07c92598647160b11ab0deef4c452098e223e443c1ca425"
]
],
"content": "📅 Original date posted:2019-11-06\n📝 Original message:\nOn Wed, Nov 06, 2019 at 10:43:23AM +1030, Rusty Russell wrote:\n\u003e \u003e\u003e Rusty prepares a nonce, AAAAA and hashes it 25 times = ZZZZZ.\n\u003e \u003e\u003e ZmnSCPxj prepares the onion, but adds extra fields (see below). \n\u003e \u003e It would have made more sense to me for Alice (Zmn) to generate\n\u003e \u003e the nonce, hash it, and prepare the onion, so that the nonce is\n\u003e \u003e revealed to Dave (Rusty) if/when the message ever actually reaches its\n\u003e \u003e destination. Otherwise Rusty has to send AAAAA to Zmn already so that\n\u003e \u003e Zmn can prepare the onion?\n\u003e The entire point is to pay *up-front*, though, to prevent spam.\n\nHmm, I'm not sure I see the point of paying upfront but not\nunconditionally -- you already commit the funds as part of the HTLC,\nand if you're refunding some of them, you kind-of have to keep them\nreserved or you risk finalising the HTLC causing a failure because you\ndon't have enough msats spare to do the refund?\n\nIf you refund on routing failure, why wouldn't a spammer just add a fake\n\"Ezekiel\" at the end of the route after Dave, so that the HTLCs always\nfail and all the fees are returned?\n\n\u003e Bob/ZmnSCPxj doesn't prepare anything in the onion. They get handed the\n\u003e last hash directly: Alice is saying \"I'll pay you 50msat for each\n\u003e preimage you can give me leading to this hash\".\n\nSo my example was Alice paying Dave via Bob and Carol (so Alice/Bob,\nBob/Carol, Carol/Dave being the individual channels).\n\nWhat you wrote to Zmn says \"Rusty decrypts the onion, reads the prepay\nfield: it says 14, LLLL.\" but Alice doesn't know anything other than\nZZZZ so can't put LLLL in the onion?\n\nAre you using Hornet so that every intermediary can communicate a nonce\nback to the source of the route? If not, \"Rusty\" generating the nonce\nseems like you're informing Rusty that you're actually the origin of the\nHTLC, and not just innocently forwarding it along; if so, it seems like\nyou have independent nonces at each step, rather than\nAAAA/BBBB/LLLL/ZZZZ in a direct chain.\n\n\u003e \u003e I'm not sure why lucky hashing should result in a discount?\n\u003e Because the PoW adds noise to the amounts, otherwise the path length is\n\u003e trivially exposed, esp in the failure case. It's weak protection\n\u003e though.\n\nWith a linear/exponential relationship you just get \"half the time it's\n1 unit, 25% of the time it's 2 units, 12% of the time it's 3 units\", so\nI don't think that's adding much noise?\n\n\u003e \u003e You've only got two nonce choices -- the initial AAAA and the depth\n\u003e \u003e that you tell Bob and Carol to hash to as steps in the route;\n\u003e No, the sphinx construction allows for grinding, that was my intent\n\u003e here. The prepay hashes are independent.\n\nOh, because you're also xoring with the onion packet, right, I see.\n\n\u003e \u003e I think you could just make the scheme be:\n\u003e \u003e Alice sends HTLC(k,v) + 1250 msat to Bob\n\u003e \u003e Bob unwraps the onion and forwards HTLC(k,v) + 500 msat to Carol\n\u003e \u003e Carol unwraps the onion and forwards HTLC(k,v) + 250 msat to Dave\n\u003e \u003e Dave redeems the HTLC, claims an extra 300 msat and refunds 200 msat to Carol\n\nThe math here doesn't add up. Let's assume I meant:\n\n Bob keeps 500 sat, forwards 750 sat\n Carol keeps 250 sat, forwards 500 sat\n Dave keeps 300 sat, refunds 200 sat\n\n\u003e \u003e Carol redeems the HTLC and refunds 200 msat to Bob\n\u003e \u003e Bob redeems the HTLC and refunds 200 msat to Alice\n\u003e \u003e\n\u003e \u003e If there's a failure, Alice loses the 1250 msat, and someone in the\n\u003e \u003e path steals the funds.\n\u003e This example confuses me.\n\nWell, that makes us even at least? :)\n\n\u003e So, you're charging 250msat per hop? Why is Bob taking 750? Does Carol\n\u003e now know Dave is the last hop?\n\nNo, Alice is choosing to pay 500, 250 and 300 msat to Bob, Carol and\nDave respectively, as part of setting up the onion, and picks those\nnumbers via some magic algo trading off privacy and cost.\n\n\u003e Does Alice lose everything on any routing failure?\n\nThat was my thought yeah; it seems weird to pay upfront but expect a\nrefund on failure -- the HTLC funds are already committed upfront and\nrefunded on failure.\n\n\u003e If so, that is strong incentive for Alice to reduce path-length privacy\n\u003e by keeping payments minimal, which I was really trying to avoid.\n\nAssuming v is much larger than 1250msat, and 1250 msat is much lower than\nthe cost to Bob of losing the channel with Alice, I don't think that's\na problem. 1250msat pays for 125kB of bandwdith under your assumptions\nI think?\n\n\u003e \u003e Does that miss anything that all the hashing achieves?\n\u003e It does nothing if Carol is the one who can't route.\n\nIf Carol can't route, then ideally she just refunds all the money and\neveryone's happy.\n\nIf Carol tries to steal, then she can keep 750 msat instead of 250 msat.\nThis doesn't give any way for Bob to prove Carol cheated on him though;\nbut Bob could just refund the 1250 msat and write the 750 msat off as a\nloss of dealing with cheaters like Carol.\n\nCheers,\naj",
"sig": "7877ba5788c20e101d2e2ead30e5f24eda4ac47392ec601615dfa4425ed5af929d8dcd15c3a995dcc28bbdcc38c61884fddce1bf5d4728cc8cc2f540e83177f7"
}