Matt Morehouse
Matt Morehouse
I agree we should allow dipping into *our* reserve as an HTLC receiver. I'm not sure about letting the other party dip into *their* reserve to pay commitment fees though......
1. SGTM. 2. Seems reasonable. The user could specify a cancel-back threshold in their config, beneath which upstream HTLCs would be cancelled on downstream force close. Waiting until the deadline...
> IIUC, Alice wants to delay Bob from receiving his funds on chain as she thinks he's icky. She then makes some big package to try to pin this coop...
At a spec level it seems query messages should already provide this functionality. Do implementations other than CLN encounter issues with the current query mechanism? Perhaps it would be quicker...
Isn't this what extended gossip queries are for? You send a series of `query_channel_range` messages with the timestamp bit set, checking the replies against your `channel_update` timestamps. Then you can...
> Thus we rely solely on the ping/pong mechanism to check for liveness, and can get rid of the `idleTimer`. I really like this approach, but I'm afraid there's a...
I think we need to wait on this until CLN, LND (and others?) also reject such invoices. Otherwise the fuzz test will be constantly failing.
@erickcestari Did you already triage the current CI failure?: ``` Assertion failed: (*res == *last_response), function InvoiceDeserializationTarget, file driver.cpp, line 125. Invoice deserialization failed for lnbc1qqqqqqg9qqsqqsqqsqqdqqpp5s7zxqqqqqqqqqqqqqqqdqqqqqqqqqqqqqqqqqqqqq8qqq9qqqqqqfq95xw7tfpp35qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqcqpjqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqyqyqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq5s846z ==37241== ERROR: libFuzzer: deadly...
Nice work. Do you have a link to the legacy format to help in reviewing this? > Actually I will put this in draft for now, because I don't think...
> I don't fully understand why this custom mutator currently only works well with legacy HopData payloads. This is because the custom mutator is essentially decrypting, encrypting and mutating the...