@@ -274,14 +274,14 @@ For the avoidance of unclarity, the parameters to be determined are:
274
274
consensus.vDeployments[Consensus::DEPLOYMENT_CHECKTEMPLATEVERIFY].min_activation_height = 0;
275
275
276
276
Until BIP-119 reaches ACTIVE state and the
277
- SCRIPT_VERIFY_DEFAULT_CHECK_TEMPLATE_VERIFY_HASH flag is set, the network should
278
- execute a NOP4 as SCRIPT_ERR_DISCOURAGE_UPGRADABLE_NOPS for policy and a NOP for
279
- consensus.
277
+ SCRIPT_VERIFY_DEFAULT_CHECK_TEMPLATE_VERIFY_HASH flag is enforced, node implementations should (are recommended to)
278
+ execute a NOP4 as SCRIPT_ERR_DISCOURAGE_UPGRADABLE_NOPS (to deny entry to the mempool) for policy and must evaluate as
279
+ a NOP for consensus (during block validation) .
280
280
281
281
In order to facilitate using CHECKTEMPLATEVERIFY, the common case of a
282
282
PayToBareDefaultCheckTemplateVerifyHash
283
- with no scriptSig data shall be made standard to permit relaying. Future template types may be
284
- standardized later as policy changes.
283
+ with no scriptSig data may (is recommended to) be made standard to permit relaying. Future template types may be
284
+ standardized later as policy changes at the preference of the implementor .
285
285
286
286
==Reference Implementation ==
287
287
@@ -592,12 +592,13 @@ reuse-unsafe.
592
592
Because CHECKTEMPLATEVERIFY commits to the input index currently being spent, reused-keys are
593
593
guaranteed to execute in separate transactions which reduces the risk of "half-spend" type issues.
594
594
595
- ====NOP-Default and Standardness Rules ====
595
+ ====NOP-Default and Recommended Standardness Rules ====
596
596
597
- If the argument length is not exactly 32, CHECKTEMPLATEVERIFY treats it as a NOP.
598
- Many OP_NOP upgrades prefer to fail in such circumstances. In particular, for
599
- CHECKTEMPLATEVERIFY, making an invalid argument a NOP permits future soft-forks to upgrade the
600
- semantics or loosed restrictions around the value being previously pushed only.
597
+ If the argument length is not exactly 32, CHECKTEMPLATEVERIFY treats it as a NOP during
598
+ consensus validation. Implementations are recommended to fail in such circumstances during non-consensus
599
+ relaying and mempool validation. In particular, making an invalid-length argument a failure aids future
600
+ soft-forks upgrades to be able to rely on the tighter standard restrictions to safely loosen
601
+ the restrictions for standardness while tightening them for consensus with the upgrade's rules.
601
602
602
603
The standardness rules may lead an unscrupulous script developer to accidentally rely on the
603
604
stricter standardness rules to be enforced during consensus. Should that developer submit a
@@ -713,8 +714,9 @@ for an OP_NOP are a soft fork, so existing software will be fully functional wit
713
714
for mining and block validation. Similar soft forks for OP_CHECKSEQUENCEVERIFY and OP_CHECKLOCKTIMEVERIFY
714
715
(see BIP-0065 and BIP-0112) have similarly changed OP_NOP semantics without introducing compatibility issues.
715
716
716
- In contrast to previous forks, OP_CHECKTEMPLATEVERIFY's implementation does not allow transactions with spending
717
- scripts using it to be accepted to the mempool or relayed under standard policy until the new rule is active.
717
+ In contrast to previous forks, OP_CHECKTEMPLATEVERIFY's reference implementation does not allow transactions with spending
718
+ scripts using it to be accepted to the mempool or relayed under standard policy until the new rule is active. Other implementations
719
+ are recommended to follow this rule as well, but not required.
718
720
719
721
Older wallet software will be able to accept spends from OP_CHECKTEMPLATEVERIFY outputs, but will
720
722
require an upgrade in order to treat PayToBareDefaultCheckTemplateVerifyHash chains with a confirmed ancestor as
0 commit comments