> With that in mind, I thought it'd be worthwhile to Devil's Advocate the change, and go through
> some technically valid arguments against it:
Let me add a steel man for another argument against the change as proposed.
# Lifting the limit *entirely* is unnecessary
Bitcoin Core's standardness rules fail to deter unwanted Bitcoin usage in the presence of sustained
economic demand. They may only cause a minor and temporary inconvenience to users of such
transactions until they set up a separate transaction relay network or start using competing direct
submission services.
That said they can be an effective barrier to bootstrapping such demand in the first place. If we
take the example of inscriptions, it is not hard to imagine that if the leaf script size had been
limited by standardness from the get go (which may be undesirable for other reasons) inscriptions
would have never really taken off.
The renewed discussion around relaxing the OP_RETURN standardness limit is due to newfound evidence
that people attempting to use the transaction relay network are working around the limitation by
using fake public keys in forever-unspendable outputs, which impose a much greater cost to node
runners than simple OP_RETURN outputs. This was illustrated by Citrea's BitVM bridge design which
requires storing some data specifically in the output(s) of a transaction.
Such design only needs to store a small amount of data there. However we need to consider forward
compatibility in changing the limit, as tailoring it to the very specific instance of Citrea may not
be a good fit for future usecases. We may not notice the publication of a future design until it is
actively being used, at which point its developers might understandably be reluctant to go back and
make the change. Another possibility is that developers of a future application might just not be
interested in engaging with our negative externality concerns after the fact, but would have just
used OP_RETURN outputs in the first place if there were an available option.
This is a valid argument for leaving some wiggle room for forward compatibility with yet-unknown
usecases. However if we think on the margin it is not a convincing for going all the way to the
maximum standard transaction size. Certainly it makes sense to go for instance up to 1 KB. But what
is the rationale for going from 1 KB to 99 KB?
It is easy to relax a standardness limit, but very hard to go back. In a sense, what we want for
standardness rules is the opposite of what we want for consensus. Relaxing the limit on the size of
OP_RETURN outputs may enable unforeseen usages that we would not be able to prevent anymore once it
is done. For this reason, we need to be conservative in picking the new limit.
Lifting the limit is desirable. Lifting the limit *entirely* is unnecessary. Instead of the implicit
~100 KB limit, a more conservative limit of 1 KB should be preferred.
On Friday, May 2nd, 2025 at 4:03 PM, Peter Todd <pete@petertodd.org> wrote:
>
>
> On Thu, May 01, 2025 at 10:40:19PM +0000, 'Antoine Poinsot' via Bitcoin Development Mailing List wrote:
>
> > As i have repeatedly asked people to take conceptual discussions to the mailing list, i am circling back to this thread to answer objections. I have also written my point of view and reasons for proposing this change in a blog post which goes into more details: https://antoinep.com/posts/relay_policy_drama.
>
>
> I agree with the linked write-up: the quality of debate has been
> atrocious. We've had a bunch of people who should know better, making
> points that don't make technical sense, and a bunch of passerby's
> repeating that nonsense (as well as even more nonsensical arguments).
>
> With that in mind, I thought it'd be worthwhile to Devil's Advocate the
> change, and go through some technically valid arguments against it:
>
>
> # Uninterrupted Illicit Data
>
> Credit where credit is due, this was the only reasonable argument
> against that was actually brought up on GitHub. In short, OP_Return,
> unlike other standard ways of embedding data in Bitcoin transactions,
> allows for long uninterrupted, arbitrary, messages to be embedded
> verbatim.
>
> The claimed risk is that this data could then end up peoples' hard
> drives, complicating forensics analysis in the future and potentially
> falsely incriminating people. (if you can encode your illicit data such
> that the right bytes happen to match Bitcoin opcodes, you can already
> embed it verbatim, uninterrupted, as seen by how inscriptions embed data
> in witnesses; Martin Habovštiak already brought this up on this very
> list).
>
> We already have this issue with dumb virus detection software. Which is
> why a few years ago code was added to XOR "encrypt" the block*.dat files
> by default (chainstate is also XOR "encrypted").
>
> The only remaining argument here is if we should go to the trouble of
> adding code to Bitcoin Core to convert existing block*.dat files to the
> XOR scheme, without re-downloading.
>
>
> # Setting Policy Expectations For a Consensus Change
>
> While it is clearly infeasible to prevent people from publishing data
> with Bitcoin's existing consensus rules, it is hypothetically possible
> to make data publication somewhat more expensive with consensus changes.
> Gregory Maxwell outlined how to do so on this mailing list years ago
> (I'm not going to dig up the reference). Basically his approach works as
> follows:
>
> 1) Limit all data in the chain to be either hash digests, signatures,
> pubkeys, or trivial values like true and false.
>
> 2) Require transactions to prove that every item of data is what it
> claims to be with, e.g. a hash digest pre-image, a valid signature (for
> a pubkey), or the fact that a signature was valid. I may be wrong. But I
> believe that with protocol changes it is possible for Lightning and
> Ark to work in this model.
>
> 3) Phase out non-compliant transactions, e.g. applying a block-weight
> multiplier that increases over time to eventually make them entirely
> unaffordable.
>
> Note that such a scheme will require massive ecosystem wide change:
> even existing address standards will need to be modified (and made
> larger) to prove that you are paying to a real address rather than
> something encoding data.
>
> Also note that even this consensus change still won't entirely
> prevent people from publishing data! No-matter what we do you can always
> grind pubkeys and hashes to set the first 4-6 bytes of them to the value
> that you want. Thus if you're pushing 32 bytes of data, encoded as 33
> bytes including the serialized length, and get 5 bytes per push, you
> have an overhead of about 6.6x. Existing data encoders have been happy
> to pay even more money than that in terms of increased fees during fee
> spikes; the difference in cost between witness space and txout space is
> already 4x, and some are happy to publish data that way anyway.
>
> A tricky thing here is upgrade paths. If we make these rules apply to
> all transactions, with any version number, we've radically limited our
> ability to upgrade the Bitcoin protocol in the future. We probably can
> make this not apply to transactions and taproot script types with
> unknown version numbers. However we'd have to do something like ensure
> it only applies to insecure transactions without signatures. And even
> then some miners will bypass this by mining that stuff anyway for a fee.
> That's pretty ugly. Maybe we can make a mechanism where miners signal
> support to allow new version numbers first, prior to an upgrade. But
> that also adds plenty of complexity.
>
> That said, if the Luke's of the world want to make a reasonable
> technical argument, come up with a reasonable scheme like the above and
> show that it has a chance of actually getting implemented.
>
> --
> https://petertodd.org 'peter'[:-1]@petertodd.org
--
You received this message because you are subscribed to the Google Groups "Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to bitcoindev+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/bitcoindev/7Q6uglccxrI_LPvP2bKeTwFcBAKJ5u8u6NHtDl-dNev_kplv2lfh46r-z2iflmtnnsa8YWgn1A2M8S0jLORI2GxwNQ7qmfyM2jqQiB6JTiw%3D%40protonmail.com.