Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Lightning Specification Meeting 2022/05/09 #986

Closed
4 of 22 tasks
t-bast opened this issue May 4, 2022 · 5 comments
Closed
4 of 22 tasks

Lightning Specification Meeting 2022/05/09 #986

t-bast opened this issue May 4, 2022 · 5 comments

Comments

@t-bast
Copy link
Collaborator

t-bast commented May 4, 2022

The meeting will take place on Monday 2022/05/09 at 8pm UTC (5:30am Adelaide time) on Libera Chat IRC #lightning-dev. It is open to the public.

A video link is available for higher bandwidth communication: https://meet.jit.si/Lightning-Spec-Meeting

Pull Request Review

Waiting for interop

Long Term Updates

Backlog

The following are topics that we should discuss at some point, so if we have time to discuss them great, otherwise they slip to the next meeting.

@t-bast t-bast pinned this issue May 4, 2022
@ksedgwic
Copy link
Contributor

ksedgwic commented May 9, 2022

Was there a calendar invite for this meeting? I think I tried one last time but it had bugged permissions?

@vincenzopalazzo
Copy link
Contributor

Here we go the calendar

Sorry for the last time!

@Roasbeef
Copy link
Collaborator

Roasbeef commented May 9, 2022

Interop update:

  • Eclair ready to do dual funding interop w/ CL needs an updated version to test against.
    • Re RBF: CL has an RPC mechanism to trigger an update
    • Has some cross over with splicing potentially

On splicing:

  • Half baked idea from roasbeef: re-use the anchor outputs in the splicing transaction to give verifiers an on-chain signal that this is actually a splicing transaction. A channel_announcement would then signal explicitly if the channel is splice-able or not
    • Another on-chain: just re-use the multi-sig keys, so then people 100% know it's a splice

@Roasbeef
Copy link
Collaborator

Roasbeef commented May 9, 2022

Zero conf:

  • From decker working on it: what if some features in the channel type TLV were optional, able to flag "maybe" zero conf, then the responder can signal if they accept it or not (?).
  • From eugene: doesn't specify that you shouldn't chose alias A if it conflicts with a pre-existing or future channel (seems to be underspecified)

@TheBlueMatt
Copy link
Collaborator

From decker working on it: what if some features in the channel type TLV were optional

Yes, maybe we should consider that. This is orthogonal, though.

able to flag "maybe" zero conf, then the responder can signal if they accept it or not (?).

Yes, just dont set the 0conf channel type bit. This is an important part of the spec, yes, LDK will never set the 0conf channel type bit, and Rusty had previously said CLN is unlikely to as well. Nodes can always accept a channel at 0conf with or without the 0conf channel type bit.

From eugene: doesn't specify that you shouldn't chose alias A if it conflicts with a pre-existing or future channel (seems to be underspecified)

Yes, definitely something you need to consider while implementing, not sure that it really needs to be specified, don't shoot yourself in the face, though, obviously.

@t-bast t-bast unpinned this issue May 18, 2022
@t-bast t-bast closed this as completed May 18, 2022
TheBlueMatt added a commit to rustyrussell/lightning-rfc that referenced this issue May 30, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants