Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"Build an LDK Light Client" guide starter #21

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
111 changes: 111 additions & 0 deletions docs/mobile.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,111 @@
---
id: mobile
title: "LDK for Lightning mobile devices"
---

## Introduction

This documents covers the challenges of building a mobile-first Lightning node and what
solution LDK offers. Note, this documentation already supposes a reader's familiarity with
the Lightning protocol and Bitcoin fundamental notions.

* [Fee Estimation](#fee-estimation) covers issues related to fee-estimation
* [Liveliness & Watchtowers](#watchtowers) covers issues related to Lightning liveliness requirement
* [Chain-validation](#chain-validation) covers issues related to chain validation

## Fee Estimation

A Lightning node can broadcast four types of transactions. A _funding transaction_, to open one or
multiple channel transactions. A _penalty transaction_ in reaction of a cheating by a counterparties
to double-spend a channel. A _commitment transaction_, either motivated by reallocating funds
locked in this channel to another purpose or in reaction to a in-flight HTLC to claim onchain. Such
unilateral broadcast should only happen when the counterparty is faulting to cooperate. A _closing
transaction_, cooperatively built by parties to complete the channel.

Block space being a scarce resources, a Lightning node, similar to any other kind of Bitcoin applications
is in competition to confirm its transactions. While bidding to get its transaction included, a
Bitcoin application's fee-estimation should be as accurate as possible to save in fees. Further, a
Lightning node has a time-sensitive requirement with regards to confirmation. Commitment and penalty
transactions, must be confirmed before a block height timelock expire. After the timelock expiration
the counterparty can confirm transactions at its advantage, resulting in a loss of funds of the
Lightning user.

Contrary to simple Bitcoin transactions, of which the delaying of confirmation isn't directly
provoking losses, in Lightning fee-estimation accuracy is a safety-critical requirement.

Bitcoin Core implements fee-estimation in a way which attemps to be robust against various censorship
attacks by analyzing transactions that were both in its mempool and were later confirmed. By avoiding
waiting for confirmation, other fee estimators may respond faster to fee spikes. Due to its
immediate confirmation pressure, Lightning may benefit from a fee estimator more in the second
category, but care must be taken to avoid P2P censorship attacks or unbounded fee inflation. LDK
attempts to deal with insufficient fee-estimation by using RBF and slowly increasing transaction
fees until confirmation.

LDK offers a `lightning-fee-estimation` crate and its bindings, implementing the
`chaininterface::FeeEstimator` trait and thus servicing smoothly the rest of the LDK engine. This
utility will be a RPC HTTP client, configurable to be pointed toward any Bitcoin Core full-node.

## Liveliness & Watchtowers

A Lightning node must always monitor blockchain updates to react in consequence, either in case of
a revoked commitment transaction confirmed or reaching block height at which an HTLC expires. This
is a strong requirement as even missing few hours of blocks might trigger a loss of funds. Mobile
devices with an unreliable access to Internet or often shutdown by their users are particularly
sensible to this issue.

This liveliness requirement is function of which Lightning situation is considered.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It may be worth talking about the differences between CSV and CLTV-based deadlines. Specifically, if you do not have any pending HTLCs around, checking the chain once per day (depending on your CLTV setting) may suffice. However, pending HTLCs change the situation significantly, where you need to check much more aggressively.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It really depends. If you're using timelock offset tricks on your outgoing/incoming HTLCs, the CSV delay is actually your "should-be-back-online" constraint.


As soon, as a payment has been initiated on the channel, your counterparty can broadcast _any old
commitment_ at _any time_ thus forcing your Lightning node to be always online in anticipation of such
an event. Watchtowers have been designed by the Lightning community to delegate such justice
enforcement function to an external entity. As this entity is trusted to broadcast client penalty
transactions, it is recommended to rely on multiple of them.

Currently, the LDK community is engaged on adoption of BOLT13, a cross-implementation standard
for watchtowers. LDK hope to offer soon a client-side implementation of BOLT13, pluggable on
the LDK engine. Beyond, if channels are opened with low-trust counterparties, it's recommended
to use longuer timelocks delays in your configuration (`ChannelHandshakeConfig::our_to_self_delay`).

With regards to handling in-flight HTLCs, a Lightning node not online when an HTLC has expired is
taking the risk of seeing its counterparty canceling onchain the HTLC and thus loosing funds.

In case of sending a payment, if it doesn't succeed immediately (e.g waiting on the receiver to
be online), the mobile should be back online later to remove the sent HTLC in cooperation with
channel counterparty or worst-case scenario to broadcast onchain the commitment transaction and
a corresponding HTLC-timeout. Setting a long CLTV delay at first hop relay offers a _time window_
for how long the mobile device can be offline. Ideally, the Lightning application will send a
notification to the user at half of the CLTV delay warning about the requirement to connect back
to the network.

In case of receiving a payment, if it doesn't succeed immediately (e.g waiting on payer interactions
to receive the preimage), the mobile should be back online to hopefully learn payment preimage
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm? I mean if we're the recipient we either know the preimage or we don't, there's not really a learn-it-later outcome unless we're forwarding.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think you can have more complex settlement scenarios. E.g when the HTLC is used for a swap or as a fidelity bond.

and thus either claim the received HTLC in cooperation with channel counterparty or worst-case scenario
to broadcast onchain the commitment transaction and a corresponding HTLC-Success. Requiring a long
CLTV delay at last hop offers a _time window_ for how long the mobile device can be offline. With
LDK, this can be easily done by checking `event::PaymentReceived` at reception. Ideally, the
Lightning application will send a notification to the user at half of the CLTV delay warning about
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we need a discussion about how you may wish to use a lightning node that all your clients open channels with and use that to send Apple/Google push notifications to wake your app up? I believe that approach was...spotty at best when @arik-so looked into it.

Copy link
Contributor

@arik-so arik-so Mar 2, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yup. At least on iOS, there is basically no way to guarantee that a push notification will invoke background processing both promptly enough and with sufficient time to handle any necessary calculations.
The one exception to that rule is VoIP apps, which have special permissions for server-invoked operations.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You mean your background task may never have any CPU ticks ? Even if you take few hours of margin of errors ?

Do we need a discussion about how you may wish to use a lightning node that all your clients open channels with and use that to send Apple/Google push notifications to wake your app up?

It doesn't have to open channels, just a e&a transport ? But in fine trust sounds similar to a watchtower...

the requirement to connect back to the network.

Note, if you don't have HTLC in-flight, checking the chain once per day (depending on your justice
CSV delay) is a safe behavior.

## Chain Validation

A Lightning node needs access to the chain to verify channel utxo state. Failure to do so
might lead to accept payments on a non-existent or already-closed channel, thus provoking a loss of
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note that accepting payments on an already-closed channel is ok, as long as the CLTV timeout hasn't passed.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

But you won't get this new accepted payment as your balance is already committed onchain ? If you provide a service in exchange you don't compensation for it?

funds. As chain validation is a costly processing, a mobile device might not have the bandwidth/CPU/
storage resources to allocate for.

In the Bitcoin ecosystem, mobile devices have been in practice relying on lightclient protocols
such as Electrum, BIP37 or BIP157 to access chain data. If the server isn't operated by the mobile
device user, it should be noted that funds security might be jeopardized by this entity.

LDK offers a ready-to-integrate client that fetches full block from RPC or REST, serviced by a
Bitcoin Core node. Its API allows you yo build a filtering client to parse chain data for the
rest of the LDK engine (`chain::Filter`).

Note, a Lightning client doesn't have to wait syncing with chain tip to start some LN operations.
Assuming client wallet keys have not leaked, a channel funding sequence should be always valid.
Further, sending payment is only decreasing user balance. In case of the channel being already
closed, the user balance committed onchain will be higher, thus at its advantage (and a loss for
the counterparty...)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I actually think we can just say "you can run totally normally once you're within the CLTV delay of the channel".

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You mean CLTV delay minus best-chain tip OR CSV delay ? Effectively I think both holds you're done with headers-sync.

9 changes: 7 additions & 2 deletions docs/use_cases.md
Original file line number Diff line number Diff line change
@@ -19,8 +19,13 @@ supports routing data being fetched via the Lightning P2P protocol, an external
service, or routes can be calculated off-device. It also provides cross-platform
compatibility for free, allowing synchronization of lightning state across
devices and, as long as there is protection from simultaneous-updates, users to
access their wallet on any device. See the [Overview](overview.md) page for more
details on the interfaces LDK provides for integration.
access their wallet on any device.

See the [Overview](overview.md) page for more details on the interfaces LDK
provides for integration.

See the [Mobile](mobile.md) page for more details on the challenges of
Lightning on mobile devices and what solutions LDK offers.

## HSMs (Hardware Security Modules)

2 changes: 1 addition & 1 deletion sidebars.js
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
module.exports = {
someSidebar: {
'Lightning Development Kit': ['overview', 'use_cases'],
Guides: ['build_node', 'open_channel', 'key_mgmt', 'blockdata'],
Guides: ['build_node', 'open_channel', 'key_mgmt', 'blockdata', 'mobile'],
},
};