Skip to content

Commit 76f35bb

Browse files
committed
Newsletters: add 237 (2023-02-08)
1 parent f1b2554 commit 76f35bb

File tree

1 file changed

+130
-0
lines changed

1 file changed

+130
-0
lines changed
Lines changed: 130 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,130 @@
1+
---
2+
title: 'Bitcoin Optech Newsletter #237'
3+
permalink: /en/newsletters/2023/02/08/
4+
name: 2023-02-08-newsletter
5+
slug: 2023-02-08-newsletter
6+
type: newsletter
7+
layout: newsletter
8+
lang: en
9+
---
10+
This week's newsletter summarizes a discussion about storing data in
11+
transaction witnesses and references a conversation about mitigating LN
12+
jamming. Also included are our regular sections with the summary of a
13+
Bitcoin Core PR Review Club meeting, announcements of new releases and
14+
release candidates, and descriptions of notable changes to popular
15+
Bitcoin infrastructure software.
16+
17+
## News
18+
19+
- **Discussion about storing data in the block chain:** users of a new
20+
project recently began storing large amounts of data in the witness
21+
data for segwit v1 ([taproot][topic taproot]) transactions. Robert
22+
Dickinson [posted][dickinson ordinal] to the Bitcoin-Dev mailing list
23+
to inquire about whether a size limit should be imposed to discourage
24+
such data storage.
25+
26+
Andrew Poelstra [replied][poelstra ordinal] that there is no
27+
effective way to prevent data storage. Adding new restrictions to
28+
prevent unwanted data storage in witnesses would undermine
29+
advantages discussed during taproot's design (see [Newsletter
30+
#65][news65 tapscript]) and would likely only result in the data
31+
being stored in other ways. Those other ways might raise costs for
32+
those generating the data---but probably not by enough to
33+
significantly discourage the behavior---and the alternative storage
34+
methods might create new problems for traditional Bitcoin users.
35+
36+
- **Summary of call about mitigating LN jamming:** Carla Kirk-Cohen and
37+
Clara Shikhelman [posted][ckccs jamming] to the Lightning-Dev mailing
38+
list a summary of a recent video conversation about attempts to
39+
address [channel jamming attacks][topic channel jamming attacks].
40+
Topics discussed included upgrade mechanism tradeoffs, a simple
41+
proposal for upfront fees derived from a recent paper (see [Newsletter
42+
#226][news226 jam]), the CircuitBreaker software (see [Newsletter
43+
#230][news230 jam]), an update on reputation credentials (see
44+
[Newsletter #228][news228 jam]), and related work from the Lightning
45+
Service Provider (LSP) specification working group. See the mailing
46+
list post for extended summaries and a [transcript][jam xs].
47+
48+
Future video meetings are planned for every two weeks; watch the
49+
Lightning-Dev mailing list for announcements of upcoming meetings.
50+
51+
## Bitcoin Core PR Review Club
52+
53+
*In this monthly section, we summarize a recent [Bitcoin Core PR Review Club][]
54+
meeting, highlighting some of the important questions and answers. Click on a
55+
question below to see a summary of the answer from the meeting.*
56+
57+
FIXME is a PR by FIXME that FIXME:LarryRuane
58+
59+
{% include functions/details-list.md
60+
q0="FIXME"
61+
a0="FIXME"
62+
a0link="https://bitcoincore.reviews/FIXME#l-FIXME"
63+
%}
64+
65+
<!-- FIXME:harding to add releases/rc if any on Tuesday -->
66+
67+
## Notable code and documentation changes
68+
69+
*Notable changes this week in [Bitcoin Core][bitcoin core repo], [Core
70+
Lightning][core lightning repo], [Eclair][eclair repo], [LDK][ldk repo],
71+
[LND][lnd repo], [libsecp256k1][libsecp256k1 repo], [Hardware Wallet
72+
Interface (HWI)][hwi repo], [Rust Bitcoin][rust bitcoin repo], [BTCPay
73+
Server][btcpay server repo], [BDK][bdk repo], [Bitcoin Improvement
74+
Proposals (BIPs)][bips repo], and [Lightning BOLTs][bolts repo].*
75+
76+
- [Bitcoin Core #25880][] p2p: Make stalling timeout adaptive during IBD FIXME:Xekyo
77+
78+
- [Core Lightning #5679][] sql plugin FIXME:adamjonas
79+
80+
- [Core Lightning #5821][] adds `preapproveinvoice` (pre-approve
81+
invoice) and `preapprovekeysend` (pre-approve keysend) RPCs that allow
82+
the caller to send either a [BOLT11][] invoice or a [keysend][topic
83+
spontaneous payments] payment details to Core Lightning's signing module
84+
(`hsmd`) to verify the module is willing to sign the payment. For
85+
some applications, such as those where the amount of money which can
86+
be spent is rate limited, asking for pre-approval might produce fewer
87+
problems than simply attempting the payment and dealing with failure.
88+
89+
- [Core Lightning #5849][] makes backend changes that allow a node to
90+
handle over 100,000 peers each with one channel. Although someone
91+
running such a node in production is not likely in the near
92+
future---it would take over a dozen entire blocks to just open that
93+
many channels---testing the behavior helped the developer make several
94+
performance improvements.
95+
96+
- [Core Lightning #5892][] updates CLN's implementation of the
97+
[offers][topic offers] protocol based on compatibility testing
98+
performed by a developer working on Eclair's implementation.
99+
100+
- [Eclair #2565][] now requests that funds from a closed channel be sent
101+
to a new onchain address, rather than an address which was generated
102+
when the channel was funded. This may decrease [output linking][topic
103+
output linking], which helps improve user privacy. An exception to
104+
this policy is when the user enables the LN protocol option
105+
`upfront-shutdown-script`, which is a request sent to the channel
106+
partner at funding time to only use the closing address specified at
107+
that time (see [Newsletter #158][news158 upfront] for details).
108+
109+
- [LND #7252][] adds support for using Sqlite as LND's database backend.
110+
This is currently only supported for new installs of LND as there is
111+
no code for migrating an existing database.
112+
113+
- [LND #6527][] adds the ability to encrypt the server's on-disk TLS
114+
key. LND uses TLS for authenticating remote connections to its
115+
control channel, i.e. to run APIs. The TLS key will be encrypted
116+
using data from the node's wallet, so unlocking the wallet will unlock
117+
the TLS key. Unlocking the wallet is already required to send and
118+
accept payments.
119+
120+
{% include references.md %}
121+
{% include linkers/issues.md v=2 issues="25880,5679,5821,5849,5892,2565,7252,6527" %}
122+
[news158 upfront]: /en/newsletters/2021/07/21/#eclair-1846
123+
[dickinson ordinal]: https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2023-January/021370.html
124+
[poelstra ordinal]: https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2023-January/021372.html
125+
[news65 tapscript]: /en/newsletters/2019/09/25/#tapscript-resource-limits
126+
[ckccs jamming]: https://lists.linuxfoundation.org/pipermail/lightning-dev/2023-January/003834.html
127+
[news226 jam]: /en/newsletters/2022/11/16/#paper-about-channel-jamming-attacks
128+
[news230 jam]: /en/newsletters/2022/12/14/#local-jamming-to-prevent-remote-jamming
129+
[news228 jam]: /en/newsletters/2022/11/30/#reputation-credentials-proposal-to-mitigate-ln-jamming-attacks
130+
[jam xs]: https://github.com/ClaraShk/LNJamming/blob/main/meeting-transcripts/23-01-23-transcript.md

0 commit comments

Comments
 (0)