8000 Newsletters: add 308 (2024-06-21) by harding · Pull Request #1735 · bitcoinops/bitcoinops.github.io · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Newsletters: add 308 (2024-06-21) #1735

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 3 commits into from
Jun 21, 2024

Conversation

harding
Copy link
Collaborator
@harding harding commented Jun 17, 2024


- **Continued discussion of PSBTs for silent payments:** several
developers have been discussing adding support for coordinating the
sending [silent payments][topic silent payments] using [PSBTs][topic
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
sending [silent payments][topic silent payments] using [PSBTs][topic
sending of [silent payments][topic silent payments] using [PSBTs][topic

- **Continued discussion of PSBTs for silent payments:** several
developers have been discussing adding support for coordinating the
sending [silent payments][topic silent payments] using [PSBTs][topic
psbt]. Since our [previous summary][news304 sp-psbt], discussion has
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
psbt]. Since our [previous summary][news304 sp-psbt], discussion has
psbt]. Since our [previous summary][news304 sp-psbt], the discussion has

(or multiple keys with multiple output scripts if multiple silent
payments are being made in the same transaction).

After all of the transaction's output scripts are known, each signer
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
After all of the transaction's output scripts are known, each signer
After the transaction's output scripts are known, each signer

(minor suggestion, I think slightly better but probably okay as is, just an idea to consider)


After all of the transaction's output scripts are known, each signer
re-processes the PSBT to add their signatures. This results in a
two-round process for complete signing of the PSBT (in addition to any
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
two-round process for complete signing of the PSBT (in addition to any
two-round process for the complete signing of the PSBT (in addition to any

@vostrnad
Copy link
Contributor

May I suggest adding bitcoin/bitcoin#29325 to notable code changes? It's highly relevant to the btcd concensus failure described a few months ago in Newsletter #286.

@harding
Copy link
Collaborator Author
harding commented Jun 19, 2024

Made edits for @LarryRuane feedback (thanks!) and added a summary of the recent LND security disclosure.


LND accepted a payload's indicated size up to 4 gigabytes and would
allocate that amount of memory before further processing the payload.
This is enough exhaust the memory of some LND nodes, resulting in them
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
This is enough exhaust the memory of some LND nodes, resulting in them
This is enough to exhaust the memory of some LND nodes, resulting in them

crashing or being terminated by the operating system, and it could be
used to crash nodes that had more memory by sending multiple onion
packets constructed this way. A crashed LN node cannot send
time-sensitive transaction that may be necessary to protect its funds,
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
time-sensitive transaction that may be necessary to protect its funds,
time-sensitive transactions that may be necessary to protect its funds,

allocate that amount of memory before further processing the payload.
This is enough exhaust the memory of some LND nodes, resulting in them
crashing or being terminated by the operating system, and it could be
used to crash nodes that had more memory by sending multiple onion
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
used to crash nodes that had more memory by sending multiple onion
used to crash nodes that have more memory by sending multiple onion

two-round process for the complete signing of the PSBT (in addition to any
other rounds required by other protocols, such as [MuSig2][topic
musig]). However, if there's only one signer for the entire
transaction (e.g. the PSBT is simply being sent to a hardware signing
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
transaction (e.g. the PSBT is simply being sent to a hardware signing
transaction (e.g. the PSBT is being sent to a hardware signing


- **Volt Wallet beta announced:**
[Volt Wallet][volt github] supports descriptors, [taproot][topic taproot],
[PSBTs][topic psbt], Lightning, among other BIPs.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
[PSBTs][topic psbt], Lightning, among other BIPs.
[PSBTs][topic psbt], and Lightning, among other BIPs.

- **Constant-time analysis tool cargo-checkct announced:**
A Ledger [blog post][ledger cargo-checkct blog] announced
[cargo-checkct][cargo-checkct github], a tool that evaluates whether Rust
cryptographic libraries run in constant-time, in an effort to avoid [timing
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
cryptographic libraries run in constant-time, in an effort to avoid [timing
cryptographic libraries run in constant time to avoid [timing

@harding
Copy link
Collaborator Author
harding commented Jun 21, 2024

Added remaining content, reviewed @bitschmidty and @Gustavojfe sections (great!), and added topic entries. Thanks everyone!

@bitschmidty bitschmidty force-pushed the 2024-06-21-newsletter branch from 1fbbe62 to 17b0fb8 Compare June 21, 2024 10:37
Copy link
Contributor
@bitschmidty bitschmidty left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pushed a change for a few fixups I noticed, reviewed lede, topics, and updates. Squashed.

Thanks @harding for authoring providing final notable code summaries, @Gustavojfe for authoring, and @vostrnad and @LarryRuane for reviewing!

@bitschmidty bitschmidty merged commit ce91a8a into bitcoinops:master Jun 21, 2024
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants
0