-
Notifications
You must be signed in to change notification settings - Fork 9
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Getting rid of fee-bumping #114
Comments
A few notes on the difference between dynamic and static fee approaches:
Implementing Static fees approach:
|
The most important point here is that the "reserve feerate" (maximum feerate assumed to ever happen while we need to Cancel all our delegated vaults) is flexible and unilateral with dynamic fee bumping, whereas with pre-signing multiple versions of the transaction it's bound to for the entire duration of the deployment.
I don't think so. For the Emergency we should always pay the maximum feerate. It's a situation that should not happen and we should not rely on the watchtowers to try transactions paying lower fees first.
It's a requirement, but not for the feerates values. Those values should be set on the signing device during the ceremony and we trust it to enforce this.
I don't understand? The signing device does not store the signatures, it signs?
The
I agree. We could even go above that since this does not put a requirement on funding per WT.
Yes. I believe for this part we can say that a Cancel taking place is a rare event which surely demonstrates a mis-configuration. As such, the cost is very asymetric: you might never pay the fee cost (or you do only very rarely), but you always pay the storage, communication, and computation cost. I'd therefore be in favour of larger steps (like 100sats/vb). |
It was discussed during the meeting, and i think |
Considering we'd like to launch before all the pinning vectors are solved on the Bitcoin network, we'll go without the dynamic fee bumping for Cancel transactions. Instead, stakeholders will presign a set of Cancel transactions at different feerates. Besides a reduction in sEcUriTy [0], this approach presents benefits (for instance a big UX upside is that fees are paid from the co-owned funds).
We'll also sign Emergency transaction with ALL (which requires increasing their feerate again).
How many Cancel transactions should each stakeholder sign? What feerate should we pick?
[0] Well, it's a security fix given the current state of the network. But in theory it's a substantial decrease in the ability to get Cancel transactions confirmed in time.
EDIT: this fixes #95
The text was updated successfully, but these errors were encountered: