Weekly Edition for Thursday, Oct 20
bulletin
- Bitcoin Optech Newsletter #222
- lib-ledger-core: 2 releases, latest is 4.3.10
- lnd: 2 releases, latest is v0.15.3-beta
- 8 RFC updates
Newsletters
- Bitcoin Optech: Bitcoin Optech Newsletter #222 (October 19, 2022)
Releases
project | release | date |
---|---|---|
lib-ledger-core | 4.3.10 What's Changed
Full Changelog: https://github.com/LedgerHQ/lib-ledger-core/compare/4.3.9...4.3.10 |
2022-10-18 |
lib-ledger-core | 4.3.9 What's Changed
Full Changelog: https://github.com/LedgerHQ/lib-ledger-core/compare/4.3.8...4.3.9 |
2022-10-14 |
lnd | v0.15.3-beta This is a minor release that contains mainly bug fixes, and contains no new database migrations. This release fixes a series of bugs related to fee estimation with taproot outputs/inputs, a bug fix to ensure new channels are always properly announced, and fixes an edge case related to zero conf channels. Verifying the ReleaseIn order to verify the release, you'll need to have
Once you have the required PGP keys, you can verify the release (assuming
You should see the following if the verification was successful:
That will verify the signature of the manifest file, which ensures integrity and authenticity of the archive you've downloaded locally containing the binaries. Next, depending on your operating system, you should then re-compute the Verifying the Release TimestampFrom this new version onwards, in addition time-stamping the git tag with OpenTimeStamps, we'll also now timestamp the manifest file along with its signature. Two new files are now included along with the rest of our release artifacts: Assuming you have the opentimestamps client installed locally, the timestamps can be verified with the following commands:
Alternatively, the open timestamps website can be used to verify timestamps if one doesn't have a These timestamps should give users confidence in the integrity of this release even after the key that signed the release expires. Verifying the Release BinariesOur release binaries are fully reproducible. Third parties are able to verify that the release binaries were produced properly without having to trust the release manager(s). See our reproducible builds guide for how this can be achieved.
The release binaries are compiled with The Finally, you can also verify the tag itself with the following command:
Verifying the Docker ImagesTo verify the
Building the Contained ReleaseUsers are able to rebuild the target release themselves without having to fetch any of the dependencies. In order to do so, assuming
that
The Additionally, it's now possible to use the enclosed
⚡️⚡️⚡️ OK, now to the rest of the release notes! ⚡️⚡️⚡️ Release NotesContributors (Alphabetical Order)
|
2022-10-17 |
lnd | v0.14.4-beta This release is a back port of the chain synchronization bug fix to the Database MigrationsThis release contains no database migrations. Verifying the ReleaseIn order to verify the release, you'll need to have
Once you have the required PGP keys, you can verify the release (assuming
You should see the following if the verification was successful:
That will verify the signature of the manifest file, which ensures integrity and authenticity of the archive you've downloaded locally containing the binaries. Next, depending on your operating system, you should then re-compute the Verifying the Release TimestampFrom this new version onwards, in addition time-stamping the git tag with OpenTimeStamps, we'll also now timestamp the manifest file along with its signature. Two new files are now included along with the rest of our release artifacts: Assuming you have the opentimestamps client installed locally, the timestamps can be verified with the following commands:
Alternatively, the open timestamps website can be used to verify timestamps if one doesn't have a These timestamps should give users confidence in the integrity of this release even after the key that signed the release expires. Verifying the Release BinariesOur release binaries are fully reproducible. Third parties are able to verify that the release binaries were produced properly without having to trust the release manager(s). See our reproducible builds guide for how this can be achieved.
The release binaries are compiled with The Finally, you can also verify the tag itself with the following command:
Verifying the Docker ImagesTo verify the
Building the Contained ReleaseUsers are able to rebuild the target release themselves without having to fetch any of the dependencies. In order to do so, assuming
that
The Additionally, it's now possible to use the enclosed
⚡️⚡️⚡️ OK, now to the rest of the release notes! ⚡️⚡️⚡️ Release Notes
Contributors (Alphabetical Order)
|
2022-10-14 |
RFC
type | rfc # | title | date | status |
---|---|---|---|---|
bip | bip-0389 | [New BIP 389] Multipath descriptors | 2022-10-19 | Update |
bolt | routing gossip | BOLT 7: Onion message support (features 38/39) | 2022-10-19 | Update |
bolt | X | Lightning Specification Meeting 2022/10/10 | 2022-10-19 | Closed |
bolt | peer protocol | bolt2: fee_range clarification | 2022-10-17 | Update |
bolt | X | Splicing into a musig2 funding output | 2022-10-20 | Update |
bolt | X | Ability to set inbound and outbound fees | 2022-10-20 | Update |
slip | X | Adding Peer coin in 718 (previously unreserved) | 2022-10-19 | Closed |
slip | slip-0044 | Update slip-0044.md | 2022-10-17 | Merged |
slip | slip-0032 | BIP-32 for BLS signature | 2022-10-17 | Update |
slip | X | SLIP-xxx signing data with trezor | 2022-10-15 | Update |