2016-11-15 02:23:20 +01:00
# BOLT #5: Recommendations for On-chain Transaction Handling
## Abstract
2017-12-09 20:38:37 +01:00
Lightning allows for two parties (nodes A and B) to conduct transactions
2017-12-15 15:49:09 +01:00
off-chain by giving each of the parties a *cross-signed commitment transaction* ,
which describes the current state of the channel (basically, the current balance).
2017-12-10 00:42:12 +01:00
This *commitment transaction* is updated every time a new payment is made and
2017-12-09 20:38:37 +01:00
is spendable at all times.
2016-11-15 02:23:20 +01:00
There are three ways a channel can end:
2017-12-09 20:38:37 +01:00
1. The good way (*mutual close*): at some point nodes A and B agree to close the
channel. They generate a *closing transaction* (which is similar to a
2017-12-10 00:42:12 +01:00
commitment transaction, but without any pending payments) and publish it on the
2017-12-09 20:38:37 +01:00
blockchain (see [BOLT #2: Channel Close ](02-peer-protocol.md#channel-close )).
2. The bad way (*unilateral close*): something goes wrong, possibly without evil
intent on either side. Perhaps one party crashed, for instance. One side
2017-12-10 04:32:24 +01:00
publishes its *latest commitment transaction* .
2017-12-09 20:38:37 +01:00
3. The ugly way (*revoked transaction close*): one of the parties deliberately
2017-12-10 04:32:24 +01:00
tries to cheat, by publishing an *outdated commitment transaction* (presumably,
2017-12-15 02:08:12 +01:00
a prior version, which is more in its favor).
2017-12-09 20:38:37 +01:00
Because Lightning is designed to be trustless, there is no risk of loss of funds
2017-12-10 00:42:12 +01:00
in any of these three cases; provided that the situation is properly handled.
The goal of this document is to explain exactly how a node should react when it
encounters any of the above situations, on-chain.
2016-11-15 02:23:20 +01:00
2017-05-11 03:46:05 +02:00
# Table of Contents
* [General Nomenclature ](#general-nomenclature )
* [Commitment Transaction ](#commitment-transaction )
2017-12-09 21:04:58 +01:00
* [Failing a Channel ](#failing-a-channel )
2017-05-11 03:46:05 +02:00
* [Mutual Close Handling ](#mutual-close-handling )
2017-12-11 15:47:46 +01:00
* [Unilateral Close Handling: Local Commitment Transaction ](#unilateral-close-handling-local-commitment-transaction )
2017-12-11 14:31:13 +01:00
* [HTLC Output Handling: Local Commitment, Local Offers ](#htlc-output-handling-local-commitment-local-offers )
* [HTLC Output Handling: Local Commitment, Remote Offers ](#htlc-output-handling-local-commitment-remote-offers )
* [Unilateral Close Handling: Remote Commitment Transaction ](#unilateral-close-handling-remote-commitment-transaction )
* [HTLC Output Handling: Remote Commitment, Local Offers ](#htlc-output-handling-remote-commitment-local-offers )
* [HTLC Output Handling: Remote Commitment, Remote Offers ](#htlc-output-handling-remote-commitment-remote-offers )
2017-05-11 03:46:05 +02:00
* [Revoked Transaction Close Handling ](#revoked-transaction-close-handling )
* [Penalty Transactions Weight Calculation ](#penalty-transactions-weight-calculation )
* [General Requirements ](#general-requirements )
2017-12-09 21:04:58 +01:00
* [Appendix A: Expected Weights ](#appendix-a-expected-weights )
2017-12-06 07:08:32 +01:00
* [Expected Weight of the `to_local` Penalty Transaction Witness ](#expected-weight-of-the-to-local-penalty-transaction-witness )
2017-12-09 21:04:58 +01:00
* [Expected Weight of the `offered_htlc` Penalty Transaction Witness ](#expected-weight-of-the-offered-htlc-penalty-transaction-witness )
2017-12-06 07:08:32 +01:00
* [Expected Weight of the `accepted_htlc` Penalty Transaction Witness ](#expected-weight-of-the-accepted-htlc-penalty-transaction-witness )
2017-05-11 03:46:05 +02:00
* [Authors ](#authors )
2016-11-15 02:23:20 +01:00
# General Nomenclature
2017-12-15 02:08:12 +01:00
Any unspent output is considered to be *unresolved* and can be *resolved*
2017-12-10 00:42:12 +01:00
as detailed in this document. Usually this is accomplished by spending it with
another *resolving* transaction. Although, sometimes simply noting the output
for later wallet spending is sufficient, in which case the transaction containing
2016-11-15 02:23:20 +01:00
the output is considered to be its own *resolving* transaction.
2017-12-06 07:08:32 +01:00
Outputs that are *resolved* are considered *irrevocably resolved*
2017-12-11 14:31:13 +01:00
once the remote's *resolving* transaction is included in a block at least 100
2017-12-10 00:42:12 +01:00
deep, on the most-work blockchain. 100 blocks is far greater than the
longest known Bitcoin fork and is the same wait time used for
confirmations of miners' rewards (see [Reference Implementation ](https://github.com/bitcoin/bitcoin/blob/4db82b7aab4ad64717f742a7318e3dc6811b41be/src/consensus/tx_verify.cpp#L223 )).
2016-11-15 02:23:20 +01:00
## Requirements
2017-12-10 00:42:12 +01:00
A node:
- once it has broadcast a funding transaction OR sent a commitment signature
for a commitment transaction that contains an HTLC output:
- until all outputs are *irrevocably resolved* :
- MUST monitor the blockchain for transactions that spend any output that
is NOT *irrevocably resolved* .
- MUST *resolve* all outputs, as specified below.
- MUST be prepared to resolve outputs multiple times, in case of blockchain
reorganizations.
- upon the funding transaction being spent, if the channel is NOT already
closed:
- SHOULD fail the channel.
- MAY send a descriptive error packet.
- SHOULD ignore invalid transactions.
2016-11-15 02:23:20 +01:00
## Rationale
2017-12-11 14:31:13 +01:00
Once a local node has some funds at stake, monitoring the blockchain is required
2017-12-11 15:47:46 +01:00
to ensure the remote node does not close unilaterally.
2016-11-15 02:23:20 +01:00
2017-12-10 00:42:12 +01:00
Invalid transactions (e.g. bad signatures) can be generated by anyone,
2016-11-15 02:23:20 +01:00
(and will be ignored by the blockchain anyway), so they should not
trigger any action.
# Commitment Transaction
2017-12-10 00:42:12 +01:00
Nodes A and B each hold a *commitment transaction* . Each of these commitment
transactions has four types of outputs:
2016-11-15 02:23:20 +01:00
2017-12-10 00:42:12 +01:00
1. _A's main output_ : Zero or one output, to pay to *A's* commitment key.
2. _B's main output_ : Zero or one output, to pay to *B's* commitment key.
3. _A's offered HTLCs_ : Zero or more pending payments (*HTLCs*), to pay *B* in
return for a payment preimage.
4. _B's offered HTLCs_ : Zero or more pending payments (*HTLCs*), to pay *A* in
return for a payment preimage.
2016-11-15 02:23:20 +01:00
2017-12-10 00:42:12 +01:00
To incentivize nodes A and B to cooperate, an `OP_CHECKSEQUENCEVERIFY` relative
2017-12-10 04:32:24 +01:00
timeout encumbers node *A's outputs* (in *A's commitment transaction* ) and
node *B's outputs* (in *B's commitment transaction* ). So for example, if node A
2017-12-11 15:47:46 +01:00
publishes its commitment transaction, it will have to wait to claim its own funds,
whereas node B will have immediate access to its own funds. As a consequence, the
2017-12-10 00:42:12 +01:00
two commitment transactions are not identical, but they are (usually)
symmetrical.
2016-11-15 02:23:20 +01:00
2017-12-10 00:42:12 +01:00
See [BOLT #3: Commitment Transaction ](03-transactions.md#commitment-transaction )
for more details.
2016-11-15 02:23:20 +01:00
2017-12-09 21:04:58 +01:00
# Failing a Channel
2017-05-16 03:21:12 +02:00
2017-12-14 19:31:15 +01:00
Although closing a channel can be accomplished in several ways, the most
2017-12-10 04:32:24 +01:00
efficient is preferred.
Various error cases involve closing a channel. The requirements for sending
error messages to peers are specified in
[BOLT #1: The `error` Message ](01-messaging.md#the-error-message ).
2017-05-16 03:21:12 +02:00
## Requirements
2017-12-10 04:32:24 +01:00
A node:
- if a *local commitment transaction* has NOT ever contained a `to_local`
or HTLC output:
- MAY simply forget the channel.
- otherwise:
- if the *current commitment transaction* does NOT contain `to_local` or
other HTLC outputs:
2017-12-11 14:31:13 +01:00
- MAY simply wait for the remote node to close the channel.
- until the remote node closes:
2017-12-10 04:32:24 +01:00
- MUST NOT forget the channel.
- otherwise:
- if it has received a valid `closing_signed` message that includes a
sufficient fee:
- SHOULD use this fee to perform a *mutual close* .
- otherwise:
- MUST use the *last commitment transaction* , for which it has a
signature, to perform a *unilateral close* .
2017-05-16 03:21:12 +02:00
## Rationale
2017-12-10 04:32:24 +01:00
Since `dust_limit_satoshis` is supposed to prevent creation of uneconomic
2017-12-15 02:08:12 +01:00
outputs (which would otherwise remain forever, unspent on the blockchain), all
commitment transaction outputs MUST be spent.
2017-05-16 03:21:12 +02:00
In the early stages of a channel, it's common for one side to have
2017-12-11 15:47:46 +01:00
little or no funds in the channel; in this case, having nothing at stake, a node
need not consume resources monitoring the channel state.
2017-05-16 03:21:12 +02:00
2017-12-10 04:32:24 +01:00
There exists a bias towards preferring mutual closes over unilateral closes,
because outputs of the former are unencumbered by a delay and are directly
2017-12-11 15:47:46 +01:00
spendable by wallets. In addition, mutual close fees tend to be less exaggerated
than those of commitment transactions. So, the only reason not to use the
signature from `closing_signed` would be if the fee offered was too small for
it to be processed.
2017-05-16 03:21:12 +02:00
2016-11-15 02:23:20 +01:00
# Mutual Close Handling
A mutual close transaction *resolves* the funding transaction output.
2017-12-10 04:32:24 +01:00
In the case of a mutual close, a node need not do anything else, as it has
already agreed to the output, which is sent to its specified `scriptpubkey` (see
[BOLT #2: Closing initiation: `shutdown` ](02-peer-protocol.md#closing-initiation-shutdown )).
2016-11-15 02:23:20 +01:00
2017-12-11 15:47:46 +01:00
# Unilateral Close Handling: Local Commitment Transaction
2016-11-15 02:23:20 +01:00
2017-12-11 15:47:46 +01:00
This is the first of two cases involving unilateral closes. In this case, a
node discovers its *local commitment transaction* , which *resolves* the funding
2017-12-10 04:32:24 +01:00
transaction output.
2016-11-15 02:23:20 +01:00
2017-12-11 15:47:46 +01:00
However, a node cannot claim funds from the outputs of a unilateral close that
it initiated, until the `OP_CHECKSEQUENCEVERIFY` delay has passed (as specified
by the remote node's `to_self_delay` field). Where relevant, this situation is
noted below.
2016-11-15 02:23:20 +01:00
## Requirements
2017-12-11 15:47:46 +01:00
A node:
- upon discovering its *local commitment transaction* :
- SHOULD spend the `to_local` output to a convenient address.
- MUST wait until the `OP_CHECKSEQUENCEVERIFY` delay has passed (as
specified by the remote node's `to_self_delay` field) before spending the
output.
- Note: if the output is spent (as recommended), the output is *resolved*
by the spending transaction, otherwise it is considered *resolved* by the
commitment transaction itself.
- MAY ignore the `to_remote` output.
- Note: No action is required by the local node, as `to_remote` is
considered *resolved* by the commitment transaction itself.
2017-12-14 19:31:15 +01:00
- MUST handle HTLCs offered by itself as specified in
[HTLC Output Handling: Local Commitment, Local Offers ](#htlc-output-handling-local-commitment-local-offers ).
- MUST handle HTLCs offered by the remote node as
specified in [HTLC Output Handling: Local Commitment, Remote Offers ](#htlc-output-handling-local-commitment-remote-offers ).
2016-11-15 02:23:20 +01:00
## Rationale
2017-05-14 04:36:13 +02:00
Spending the `to_local` output avoids having to remember the complicated
2017-12-11 15:47:46 +01:00
witness script, associated with that particular channel, for later
2016-11-15 02:23:20 +01:00
spending.
2017-12-11 14:31:13 +01:00
The `to_remote` output is entirely the business of the remote node, and
2017-12-06 04:09:47 +01:00
can be ignored.
2016-11-15 02:23:20 +01:00
2017-12-11 14:31:13 +01:00
## HTLC Output Handling: Local Commitment, Local Offers
2017-09-06 07:13:50 +02:00
2017-12-11 15:47:46 +01:00
Each HTLC output can only be spent by either a local offerer, by using the HTLC-timeout
transaction after it's timed out, or a remote recipient, if it has the payment
2017-12-06 04:09:47 +01:00
preimage.
2016-11-15 02:23:20 +01:00
2017-08-31 03:32:25 +02:00
There can be HTLCs which are not represented by an output: either
2017-12-11 15:47:46 +01:00
because they were trimmed as dust, or because the transaction has only been
partially committed.
2016-11-15 02:23:20 +01:00
2017-12-11 15:47:46 +01:00
The HTLC has *timed out* once the depth of the latest block is equal to
2017-05-11 03:46:05 +02:00
or greater than the HTLC `cltv_expiry` .
2016-11-15 02:23:20 +01:00
2017-12-06 04:09:47 +01:00
### Requirements
2016-11-15 02:23:20 +01:00
2017-12-11 15:47:46 +01:00
A node:
- if the commitment transaction HTLC output is spent using the payment
preimage, the output is considered *irrevocably resolved* :
- MUST extract the payment preimage from the transaction input witness.
- if the commitment transaction HTLC output has *timed out* and hasn't been
*resolved* :
- MUST *resolve* the output by spending it using the HTLC-timeout
transaction.
- once the resolving transaction has reached reasonable depth:
- MUST fail the corresponding incoming HTLC (if any).
- MUST resolve the output of that HTLC-timeout transaction.
- SHOULD resolve the HTLC-timeout transaction by spending it to a
convenient address.
- Note: if the output is spent (as recommended), the output is
*resolved* by the spending transaction, otherwise it is considered
*resolved* by the commitment transaction itself.
- MUST wait until the `OP_CHECKSEQUENCEVERIFY` delay has passed (as
specified by the remote node's `open_channel` `to_self_delay` field)
before spending that HTLC-timeout output.
- for any committed HTLC that does NOT have an output in this commitment
transaction:
- once the commitment transaction has reached reasonable depth:
- MUST fail the corresponding incoming HTLC (if any).
- if no *valid* commitment transaction contains an output corresponding to
the HTLC.
- MAY fail the corresponding incoming HTLC sooner.
2017-08-31 03:32:25 +02:00
2017-12-06 04:09:47 +01:00
### Rationale
2017-08-31 03:32:25 +02:00
2017-12-09 20:38:37 +01:00
The payment preimage either serves to prove payment (when the offering node
originated the payment) or to redeem the corresponding incoming HTLC from
another peer (when the offering node is forwarding the payment). Once a node has
extracted the payment, it no longer cares about the fate of the HTLC-spending
transaction itself.
2016-11-15 02:23:20 +01:00
2017-12-15 02:08:12 +01:00
In cases where both resolutions are possible (e.g. when a node receives payment
2017-12-09 20:38:37 +01:00
success after timeout), either interpretation is acceptable; it is the
responsibility of the recipient to spend it before this occurs.
2016-11-15 02:23:20 +01:00
2017-12-15 15:49:09 +01:00
The local HTLC-timeout transaction needs to be used to time out the HTLC (to
prevent the remote node fulfilling it and claiming the funds) before the
local node can back-fail any corresponding incoming HTLC, using
`update_fail_htlc` (presumably with reason `permanent_channel_failure` ), as
detailed in
2017-12-09 20:38:37 +01:00
[BOLT 02 ](https://github.com/lightningnetwork/lightning-rfc/blob/master/02-peer-protocol.md#forwarding-htlcs ).
2017-12-15 15:49:09 +01:00
If the incoming HTLC is also on-chain, a node must simply wait for it to
timeout: there is no way to signal early failure.
2017-08-21 04:47:12 +02:00
2017-12-15 15:49:09 +01:00
If an HTLC is too small to appear in *any commitment transaction* , it can be
safely failed immediately. Otherwise, if an HTLC isn't in the *local commitment
transaction*, a node needs to make sure that a blockchain reorganization, or
race, does not switch to a commitment transaction that does contain the HTLC
before the node fails it (hence the wait). The requirement that the incoming
HTLC be failed before its own timeout still applies as an upper bound.
2017-08-31 03:32:25 +02:00
2017-12-11 14:31:13 +01:00
## HTLC Output Handling: Local Commitment, Remote Offers
2017-08-31 03:32:25 +02:00
2017-12-15 15:49:09 +01:00
Each HTLC output can only be spent by the recipient, using the HTLC-success
transaction, which it can only populate if it has the payment
preimage. If it doesn't have the preimage (and doesn't discover it), it's
2017-12-06 07:08:32 +01:00
the offerer's responsibility to spend the HTLC output once it's timed out.
2016-11-15 02:23:20 +01:00
2017-12-15 15:49:09 +01:00
There are several possible cases for an offered HTLC:
2017-09-18 02:33:11 +02:00
2017-12-15 15:49:09 +01:00
1. The offerer is NOT irrevocably committed to it. The recipient will usually
not know the preimage, since it will not forward HTLCs until they're fully
committed. So using the preimage would reveal that this recipient is the
final hop; thus, in this case, it's best to allow the HTLC to time out.
2. The offerer is irrevocably committed to the offered HTLC, but the recipient
has not yet committed to an outgoing HTLC. In this case, the recipient can
either forward or timeout the offered HTLC.
3. The recipient has committed to an outgoing HTLC, in exchange for the offered
HTLC. In this case, the recipient must use the preimage, once it receives it
from the outgoing HTLC; otherwise, it will lose funds by sending an outgoing
payment without redeeming the incoming payment.
2017-09-18 02:33:11 +02:00
2017-12-06 04:09:47 +01:00
### Requirements
2016-11-15 02:23:20 +01:00
2017-12-15 15:49:09 +01:00
A local node:
- if it receives (or already possesses) a payment preimage for an unresolved
HTLC output that it has been offered AND for which it has committed to an
outgoing HTLC:
- MUST *resolve* the output by spending it, using the HTLC-success
transaction.
- MUST resolve the output of that HTLC-success transaction.
- otherwise:
- if the *remote node* is NOT irrevocably committed to the HTLC:
- MUST NOT *resolve* the output by spending it.
- SHOULD resolve that HTLC-success transaction output by spending it to a
convenient address.
- MUST wait until the `OP_CHECKSEQUENCEVERIFY` delay has passed (as specified
by the *remote node's* `open_channel` 's `to_self_delay` field), before
spending that HTLC-success transaction output.
If the output is spent (as is recommended), the output is *resolved* by
the spending transaction, otherwise it's considered *resolved* by the commitment
transaction itself.
2016-11-15 02:23:20 +01:00
2017-12-15 15:49:09 +01:00
If it's NOT otherwise resolved, once the HTLC output has expired, it is
considered *irrevocably resolved* .
2016-11-15 02:23:20 +01:00
2017-12-11 14:31:13 +01:00
# Unilateral Close Handling: Remote Commitment Transaction
2016-11-15 02:23:20 +01:00
2017-12-11 14:31:13 +01:00
The *remote node's* commitment transaction *resolves* the funding
2017-12-06 04:09:47 +01:00
transaction output.
2016-11-15 02:23:20 +01:00
2017-12-11 15:47:46 +01:00
There are no delays constraining node behavior in this case, so it's simpler for
a node to handle than the case in which it discovers its local commitment
2017-12-19 07:21:59 +01:00
transaction (see [Unilateral Close Handling: Local Commitment Transaction ](#unilateral-close-handling-local-commitment-transaction )).
2016-11-15 02:23:20 +01:00
2017-12-06 04:09:47 +01:00
## Requirements
2017-12-19 07:21:59 +01:00
A local node:
- upon discovering a *valid* commitment transaction broadcast by a
*remote node* :
- if it is able to handle the broadcast:
- MUST handle it as specified below.
- MAY take no action in regard to the associated `to_remote` , which is
simply a P2WPKH output to the *local node* .
- Note: `to_remote` is considered *resolved* by the commitment transaction
itself.
- MAY take no action in regard to the associated `to_local` , which is a
payment output to the *remote node* .
- Note: `to_local` is considered *resolved* by the commitment transaction.
- MUST handle HTLCs offered by itself as specified in
[HTLC Output Handling: Remote Commitment, Local Offers ](#htlc-output-handling-remote-commitment-local-offers )
- MUST handle HTLCs offered by the remote node as specified in
[HTLC Output Handling: Remote Commitment, Remote Offers ](#htlc-output-handling-remote-commitment-remote-offers )
- otherwise (it is NOT able to handle the broadcast):
- MUST send warning regarding lost funds.
2016-11-15 02:23:20 +01:00
2017-12-06 04:09:47 +01:00
## Rationale
2016-11-15 02:23:20 +01:00
2017-12-19 07:21:59 +01:00
There may be more than one valid, *unrevoked* commitment transaction after a
signature has been received via `commitment_signed` and before the corresponding
`revoke_and_ack` . As such, either commitment may serve as the *remote node's*
commitment transaction; hence, the local node is required to handle both.
2016-11-15 02:23:20 +01:00
2017-12-19 07:21:59 +01:00
In the case of data loss, a local node may reach a state where it doesn't
recognize all of the *remote node's* commitment transaction HTLC outputs. It can
detect the data loss state, because it has signed the transaction, and the
commitment number is greater than expected. If both nodes support
`option-data-loss-protect` , the local node will possess the remote's
`per_commitment_point` , and thus can derive its own `remotekey` for the
transaction, in order to salvage its own funds. Note: in this scenario, the node
will be unable to salvage the HTLCs.
2016-11-15 02:23:20 +01:00
2017-12-11 14:31:13 +01:00
## HTLC Output Handling: Remote Commitment, Local Offers
2016-11-15 02:23:20 +01:00
2017-12-19 07:25:51 +01:00
Each HTLC output can only be spent by the *offerer* , after it's timed out, or by
the *recipient* , if it has the payment preimage.
2017-12-06 07:08:32 +01:00
2017-12-19 07:25:51 +01:00
The HTLC output has *timed out* once the depth of the latest block is equal to
2017-12-06 07:08:32 +01:00
or greater than the HTLC `cltv_expiry` .
2016-11-15 02:23:20 +01:00
2017-12-19 07:25:51 +01:00
There can be HTLCs which are not represented by any outputs: either
because the outputs were trimmed as dust or because the remote node has two
*valid* commitment transactions with differing HTLCs.
2016-11-15 02:23:20 +01:00
2017-12-06 04:09:47 +01:00
### Requirements
2016-11-15 02:23:20 +01:00
2017-12-19 07:25:51 +01:00
A local node:
- if the commitment transaction HTLC output is spent using the payment
preimage:
- MUST extract the payment preimage from the HTLC-success transaction input
witness.
- Note: the output is considered *irrevocably resolved* .
- if the commitment transaction HTLC output has *timed out* AND NOT been
*resolved* :
- MUST *resolve* the output, by spending it to a convenient address.
- for any committed HTLC that does NOT have an output in this commitment
transaction:
- once the commitment transaction has reached reasonable depth:
- MUST fail the corresponding incoming HTLC (if any).
- otherwise:
- if no *valid* commitment transaction contains an output corresponding to
the HTLC:
- MAY fail it sooner.
2016-11-15 02:23:20 +01:00
2017-12-09 21:04:58 +01:00
### Rationale
2016-11-15 02:23:20 +01:00
2017-12-15 15:49:09 +01:00
If the commitment transaction belongs to the *remote* node, the only way for it
to spend the HTLC output (using a payment preimage) is for it to use the
2017-12-06 04:09:47 +01:00
HTLC-success transaction.
2016-11-15 02:23:20 +01:00
2017-12-09 20:38:37 +01:00
The payment preimage either serves to prove payment (when the offering node
originated the payment) or to redeem the corresponding incoming HTLC from
2017-12-19 07:25:51 +01:00
another peer (when the offering node is forwarding the payment). After a node has
2017-12-09 20:38:37 +01:00
extracted the payment, it no longer cares about the fate of the HTLC-spending
transaction itself.
2017-12-06 04:09:47 +01:00
2017-12-15 15:49:09 +01:00
In cases where both resolutions are possible (e.g. when a node receives payment
2017-12-09 20:38:37 +01:00
success after timeout), either interpretation is acceptable; it is the
responsibility of the recipient to spend it before this occurs.
2017-12-06 04:09:47 +01:00
2017-12-15 15:49:09 +01:00
Once it has timed out, the HTLC output needs to be spent (to prevent
the remote node using the HTLC-success transaction) before the local node can
2017-12-06 04:09:47 +01:00
back-fail any corresponding incoming HTLC, using `update_fail_htlc`
2017-12-15 15:49:09 +01:00
(presumably with reason `permanent_channel_failure` ), as detailed in
2017-12-06 04:09:47 +01:00
[BOLT 02 ](https://github.com/lightningnetwork/lightning-rfc/blob/master/02-peer-protocol.md#forwarding-htlcs ).
2017-12-15 15:49:09 +01:00
If the incoming HTLC is also on-chain, a node simply waits for it to
2017-12-06 04:09:47 +01:00
timeout: there's no way to signal early failure.
If an HTLC is too small to appear in *any* commitment transaction, it
2017-12-06 07:08:32 +01:00
can be safely failed immediately. Otherwise,
2017-12-11 14:31:13 +01:00
if a HTLC isn't in the *local* commitment transaction a node needs to make sure
2017-12-06 04:09:47 +01:00
that a blockchain reorganization or race does not switch to a
2017-12-06 07:08:32 +01:00
commitment transaction which does contain it before the node fails it, hence
2017-12-09 20:38:37 +01:00
the wait. The requirement that the incoming HTLC be failed before its
2017-12-06 04:09:47 +01:00
own timeout still applies as an upper bound.
2017-12-11 14:31:13 +01:00
## HTLC Output Handling: Remote Commitment, Remote Offers
2017-12-06 04:09:47 +01:00
2017-12-19 07:21:59 +01:00
Each HTLC output can only be spent by the recipient, using the payment
2017-12-15 15:49:09 +01:00
preimage. If the local node does not possess the preimage (and doesn't discover
it), it's the offerer's responsibility to spend the HTLC output, once it's timed
out.
2017-12-06 07:08:32 +01:00
2017-12-15 15:49:09 +01:00
The remote HTLC outputs can only be spent by the local node if it has the
payment preimage. If the local node does not have the preimage (and doesn't
discover it), it's the remote node's responsibility to spend the HTLC output,
once it's timed out.
2017-12-06 04:09:47 +01:00
There are actually several possible cases for an offered HTLC:
2017-12-09 20:38:37 +01:00
1. The offerer is not irrevocably committed to it. The recipient won't
2017-12-06 07:08:32 +01:00
normally know the preimage here, since it won't forward HTLCs until
2017-12-09 20:38:37 +01:00
they're fully committed. So using the preimage would reveal that
2017-12-06 07:08:32 +01:00
this recipient is the final hop, so it's best to allow the HTLC to time out in
2017-12-06 04:09:47 +01:00
this case.
2017-12-06 07:08:32 +01:00
2. The offerer is irrevocably committed to the offered HTLC, but the recipient hasn't yet
2017-12-09 20:38:37 +01:00
committed to an outgoing HTLC. In this case the recipient can either forward
2017-12-06 04:09:47 +01:00
or timeout.
2017-12-09 20:38:37 +01:00
3. The recipient has committed to an outgoing HTLC for the offered one. In
2017-12-06 07:08:32 +01:00
this case the recipient has to use the preimage if it receives it from the
outgoing HTLC, otherwise it will lose funds by making an outgoing
2017-12-06 04:09:47 +01:00
payment without redeeming the incoming one.
### Requirements
If the node receives (or already knows) a payment preimage for an
unresolved HTLC output it was offered for which it has committed to an
outgoing HTLC, it MUST *resolve* the output by spending it to a
2017-12-11 14:31:13 +01:00
convenient address. Otherwise, if the remote node is not irrevocably
2017-12-06 04:09:47 +01:00
committed to the HTLC, it MUST NOT *resolve* the output by spending
it.
If not otherwise resolved, once the HTLC output has expired, it is considered
*irrevocably resolved*.
2016-11-15 02:23:20 +01:00
# Revoked Transaction Close Handling
2017-12-11 14:31:13 +01:00
If a node tries to broadcast old state, the remote node can use the revocation key
2016-11-15 02:23:20 +01:00
to claim all the funds.
## Requirements
2017-12-10 00:42:12 +01:00
A node MUST NOT broadcast a commitment transaction for which *it* has
2016-11-15 02:23:20 +01:00
exposed the revocation key.
2017-12-11 15:47:46 +01:00
If a node discovers a commitment transaction for which *it* has a
2016-11-15 02:23:20 +01:00
revocation key, that *resolves* the funding transaction output.
A node MUST resolve all unresolved outputs as follows:
1. _A's main output_ : No action is required; this is a simple P2WPKH output.
2017-12-10 00:42:12 +01:00
This output is considered *resolved* by the commitment transaction.
2016-11-15 02:23:20 +01:00
2. _B's main output_ : The node MUST *resolve* this by spending using the
revocation key.
2017-12-19 07:21:59 +01:00
3. _A's offered HTLCs_ : The node MUST *resolve* this in one of three ways by spending:
* the *commitment tx* using the payment revocation
* the *commitment tx* using the payment preimage if known
* the *HTLC-timeout tx* if B publishes them
4. _B's offered HTLCs_ : The node MUST *resolve* this in one of two ways by spending:
* the *commitment tx* using the payment revocation
* the *commitment tx* once the HTLC timeout has passed.
2016-11-15 02:23:20 +01:00
5. _B's HTLC-timeout transaction_ : The node MUST *resolve* this by
spending using the revocation key.
6. _B's HTLC-success transaction_ : The node MUST *resolve* this by
2017-12-06 07:08:32 +01:00
spending using the revocation key. The node SHOULD extract
2016-11-15 02:23:20 +01:00
the payment preimage from the transaction input witness if not
already known.
2017-12-09 20:38:37 +01:00
The node MAY use a single transaction to *resolve* all the outputs, but MUST
handle its transactions being invalidated by HTLC transactions.
2016-11-15 02:23:20 +01:00
## Rationale
2017-12-06 07:08:32 +01:00
A single transaction that resolves all the outputs will be under the
2017-11-29 01:53:54 +01:00
standard size limit thanks to the 483 HTLC-per-party limit (see
BOLT 1, BOLT 2, BOLT 5: 2-byte lengths everywhere.
Since our cryptopacket limits us to 2 bytes, and since people will
send 1-message-per-crypto-packet and nobody will test the
multiple-messages-in-one-cryptopacket code, let's just restrict to
64k messages.
1. Make cryptopacket length not include the HMAC, so we can actually send
64k messages.
2. Remove len prefix from packet, make type 2 bytes, note alignment properties.
3. Change message internal lengths/counts from 4 to 2 bytes, since more
is nonsensical anyway, and this removes a need to check before allocating:
- init feature bitfield length
- error message length
- shutdown scriptpubkey length
- commit_sig number of HTLC signatures
- revoke_and_ack number of HTLC-timeout signatures
4. Change max-accepted-htlcs to two bytes, and limit it to 511 to ensure
that commit_sig will always be under 64k.
Signed-off-by: Rusty Russell <rusty@rustcorp.com.au>
2016-11-24 05:58:30 +01:00
[BOLT #2 ](02-peer-protocol.md#the-open_channel-message )).
2016-11-15 02:23:20 +01:00
2017-12-06 07:08:32 +01:00
Note that if a single transaction is used it may be invalidated as node B
2016-11-15 02:23:20 +01:00
broadcasts HTLC-timeout and HTLC-success transactions, but the
2017-12-06 07:08:32 +01:00
requirement of persistence, until all outputs are irrevocably resolved,
2017-12-15 15:49:09 +01:00
should cover this. [ FIXME: May have to divide and conquer here, since the remote
node may be able to delay the local node long enough to avoid successful penalty spend? ]
2016-11-15 02:23:20 +01:00
2017-02-10 12:23:32 +01:00
## Penalty Transactions Weight Calculation
2016-11-15 04:21:09 +01:00
2017-12-09 20:38:37 +01:00
There are three different scripts for penalty transactions, with the following
witnesses weight (details of the computation are in
[Appendix A ](#appendix-a-expected-weights )):
2016-11-15 04:21:09 +01:00
2017-08-16 09:44:59 +02:00
to_local_penalty_witness: 160 bytes
2017-03-07 00:58:30 +01:00
offered_htlc_penalty_witness: 243 bytes
accepted_htlc_penalty_witness: 249 bytes
2016-11-15 04:21:09 +01:00
2017-12-09 20:38:37 +01:00
The penalty txinput itself takes 41 bytes, which has a weight of 164, making the
weight of each input:
2016-11-15 04:21:09 +01:00
2017-08-16 09:44:59 +02:00
to_local_penalty_input_weight: 324 bytes
2017-03-07 00:58:30 +01:00
offered_htlc_penalty_input_weight: 407 bytes
accepted_htlc_penalty_input_weight: 413 bytes
2016-11-15 04:21:09 +01:00
2017-08-16 09:44:59 +02:00
The rest of the penalty transaction takes 4+1+1+8+1+34+4=53 bytes of non-witness
2017-12-06 07:08:32 +01:00
data, assuming that it has a pay-to-witness-script-hash (the largest standard output
script), in addition to a 2-byte witness header.
2017-02-10 12:23:32 +01:00
2017-08-16 09:44:59 +02:00
In addition to outputs being swept under as penalty, the node MAY also sweep the
2017-12-06 07:08:32 +01:00
`to_remote` output of the commitment transaction (e.g. to reduce the total
amount paid in fees). Doing so requires the inclusion of a p2wpkh witness and
2017-08-16 09:44:59 +02:00
additional txinput, resulting in an additional 108 + 164 = 272 bytes.
2017-12-06 07:08:32 +01:00
In a worst case scenario, a node holds only incoming HTLCs, and the HTLC-timeout
transactions are not published, which forces the node to spend from the commitment
2017-08-16 09:44:59 +02:00
transaction.
With a maximum standard weight of 400000, the maximum number of HTLCs that can
be swept in a single transaction:
2017-12-09 20:38:37 +01:00
2017-12-14 19:31:15 +01:00
max_num_htlcs = (400000 - 324 - 272 - (4 * 53) - 2) / 413 = 966
2017-12-09 20:38:37 +01:00
2017-12-06 07:08:32 +01:00
This allows 483 HTLCs in each direction (with both `to_local` and
`to_remote` outputs) to still be resolved in a single penalty transaction.
2017-08-16 09:44:59 +02:00
Note that even if the `to_remote` output is not swept, the resulting
`max_num_htlcs` is 967, which yields the same unidirectional limit of 483 HTLCs.
2016-11-15 02:23:20 +01:00
# General Requirements
2017-12-11 15:47:46 +01:00
A node SHOULD report an error to the operator if it discovers a transaction
2016-11-15 02:23:20 +01:00
spend the funding transaction output which does not fall into one of
these categories (mutual close, unilateral close, or revoked
2017-12-09 20:38:37 +01:00
transaction close). Such a transaction implies its private key has
2016-11-15 02:23:20 +01:00
leaked, and funds may be lost.
A node MAY simply watch the contents of the most-work chain for
transactions, or MAY watch for (valid) broadcast transactions a.k.a
2017-12-09 20:38:37 +01:00
mempool. Considering mempool transactions should cause lower latency
2016-11-15 02:23:20 +01:00
for HTLC redemption, but on-chain HTLCs should be such an unusual case
that speed cannot be considered critical.
2016-11-22 20:52:59 +01:00
2017-12-09 21:04:58 +01:00
# Appendix A: Expected Weights
2017-02-10 12:23:32 +01:00
2017-12-06 07:08:32 +01:00
## Expected Weight of the `to_local` Penalty Transaction Witness
2017-02-10 12:23:32 +01:00
As described in [BOLT #3 ](03-transactions.md ), the witness for
this transaction is:
2017-05-14 02:32:22 +02:00
< sig > 1 { OP_IF < key > OP_ELSE to_self_delay OP_CSV OP_DROP < key > OP_ENDIF OP_CHECKSIG }
2017-02-10 12:23:32 +01:00
The *expected weight* is calculated as follows:
2017-08-16 09:44:59 +02:00
to_local_script: 83 bytes
2017-02-10 12:23:32 +01:00
- OP_IF: 1 byte
2017-08-16 09:44:59 +02:00
- OP_DATA: 1 byte (revocationkey length)
- revocationkey: 33 bytes
- OP_ELSE: 1 byte
- OP_DATA: 1 byte (delay length)
- delay: 8 bytes
- OP_CHECKSEQUENCEVERIFY: 1 byte
2017-12-11 10:37:01 +01:00
- OP_DROP: 1 byte
- OP_DATA: 1 byte (localkey length)
- localkey: 33 bytes
2017-08-16 09:44:59 +02:00
- OP_ENDIF: 1 byte
2017-12-11 10:37:01 +01:00
- OP_CHECKSIG: 1 byte
2017-08-16 09:44:59 +02:00
to_local_penalty_witness: 160 bytes
2017-02-10 12:23:32 +01:00
- number_of_witness_elements: 1 byte
- revocation_sig_length: 1 byte
- revocation_sig: 73 bytes
- one_length: 1 byte
- witness_script_length: 1 byte
- witness_script (to_local_script)
2017-08-16 09:44:59 +02:00
2017-12-06 07:08:32 +01:00
## Expected Weight of the `offered_htlc` Penalty Transaction Witness
2017-02-10 12:23:32 +01:00
2017-12-09 20:38:37 +01:00
The *expected weight* is calculated as follows (some calculations have already
been made in [BOLT #3 ](03-transactions.md )):
2017-02-10 12:23:32 +01:00
2017-03-07 00:58:30 +01:00
offered_htlc_script: 133 bytes
2017-12-09 20:38:37 +01:00
2017-03-07 00:58:30 +01:00
offered_htlc_penalty_witness: 243 bytes
2017-02-10 12:23:32 +01:00
- number_of_witness_elements: 1 byte
- revocation_sig_length: 1 byte
- revocation_sig: 73 bytes
2017-03-07 00:58:30 +01:00
- revocation_key_length: 1 byte
- revocation_key: 33 bytes
2017-02-10 12:23:32 +01:00
- witness_script_length: 1 byte
2017-03-07 00:58:30 +01:00
- witness_script (offered_htlc_script)
2017-02-10 12:23:32 +01:00
2017-12-06 07:08:32 +01:00
## Expected Weight of the `accepted_htlc` Penalty Transaction Witness
2017-02-10 12:23:32 +01:00
2017-12-09 20:38:37 +01:00
The *expected weight* is calculated as follows (some calculations have already
been made in [BOLT #3 ](03-transactions.md )):
2017-02-10 12:23:32 +01:00
2017-03-07 00:58:30 +01:00
accepted_htlc_script: 139 bytes
2017-12-09 20:38:37 +01:00
2017-03-07 00:58:30 +01:00
accepted_htlc_penalty_witness: 249 bytes
2017-02-10 12:23:32 +01:00
- number_of_witness_elements: 1 byte
- revocation_sig_length: 1 byte
- revocation_sig: 73 bytes
2017-03-07 00:58:30 +01:00
- revocation_key_length: 1 byte
- revocation_key: 33 bytes
2017-02-10 12:23:32 +01:00
- witness_script_length: 1 byte
2017-03-07 00:58:30 +01:00
- witness_script (accepted_htlc_script)
2017-12-09 20:38:37 +01:00
2017-05-11 03:46:05 +02:00
# Authors
2017-12-09 20:38:37 +01:00
[FIXME:]
2017-02-10 12:23:32 +01:00
2016-11-22 20:52:59 +01:00
![Creative Commons License ](https://i.creativecommons.org/l/by/4.0/88x31.png "License CC-BY" )
< br >
This work is licensed under a [Creative Commons Attribution 4.0 International License ](http://creativecommons.org/licenses/by/4.0/ ).