timbeiko.eth Profile picture
Jun 8 24 tweets 30 min read Twitter logo Read on Twitter
Had another @ethereum #ACDE earlier today: we finalized the Cancun EIP list, and discussed possible 4844, Engine API and validator spec changes 🏝️

Agenda: github.com/ethereum/pm/is…
Recording: youtube.com/live/LqaR-kdnO…

Recap below 👇
@ethereum We began the call with @dankrad making the case for changing the 4844 blob target & limit from 2/4 to 3/6.

To justify this, tests have been run on testnet + mainnet sending large blocks and analyzing the impact on the network.
@ethereum @dankrad @christine_dkim Early in the call, we reached consensus to move forward with this change. That said, the proposition later faced some opposition from the Geth team, which had concerns about the impact of the change on network stability.
@ethereum @dankrad @christine_dkim There was a lot of back and forth, but the crux of the debate is around how conservative we should be when introducing blobs to the network.
@ethereum @dankrad @christine_dkim On one hand, blobs are already a significant increase in gossiped data that will be introduced all at once. OTOH, providing L2 users with cheaper transaction fees is extremely important, and we can only increase blobs during hard forks, which are infrequent.
@ethereum @dankrad @christine_dkim After some more back and forth between @vdWijden and @dankrad at the end of the call, we agreed to keep the 3/6 target/limit combo for the next devnet and continue discussions around whether this is the right value for mainnet!
@ethereum @dankrad @christine_dkim @vdWijden On that note, @BarnabasBusa gave an update on the state of 4844 devnets: a first version of devnet-6 was launched this week with Lodestar, Teku, Nethermind and EthereumJS. With this blob count change, and other clients being ready to join soon, we'll do a full restart next week!
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa Here's the tracker we are using to determine the scope of the devnet: notes.ethereum.org/@bbusa/dencun-…

We discussed the last open PRs around JSON RPC on the call and agreed to keep those out of scope for devnet 6, but include full RPC support in devnet 7!
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa Then, we discussed a proposed change to EIP-4788, which exposes the Beacon block root in the EVM. The proposal was to limit the number of block roots stored on the EL to cap state growth. This would require more disk writes from EL clients, but everyone agreed with the change!
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa Next up, we discussed what to include alongside the previously chosen Cancun EIPs 🏝️

So far, Cancun had EIPs 1153 (Transient Storage), 4844 (ProtoDanksharding) and 6780 (SELFDESTRUCT removal). On the last ACDE, we finalized the list of EIP candidates: Image
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa Client teams rapidly agreed to include EIP-4788!

Then, there were proposals for both EIPs 5656 (MCOPY) and 5920 (PAY)
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa Due to some concerns about the potential side effects of including another way to transfer ETH, and the testing + security work required to reason through them, PAY was rejected for this upgrade.
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa Teams were initially split about MCOPY: while security concerns were addressed, there was concern about the implementation + testing bandwidth required to add this to the upgrade.
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa After some back and forth, we agreed to include the EIP, and that if we run into capacity issues on either the testing or client side, we'll consider removing it. So, MCOPY is (tentatively) included as well 🎉
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa So, TL;DR Cancun🏝️ will include:

EIP-1153: Transient storage opcodes
EIP-4788: Beacon block root in the EVM
EIP-4844: Shard Blob Transactions
EIP-5656: MCOPY - Memory copying instruction
EIP-6780: SELFDESTRUCT only in same transaction

Here's the PR: github.com/ethereum/execu… 😄
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa After we briefly discussed and agreed to a proposed change to the Engine API versioning scheme, which would remove old ExecutionPayload versions and add a timestamp check to ensure V3 payloads are only sent after the next fork activates

github.com/ethereum/execu…
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa Then, @tbenr had some questions about the validator specs. Specifically, he was wondering whether nodes should process all blobs on the network prior to sending attestations or not.
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa @tbenr Not having to do so could provide some UX benefits if a CL is swapped out on a synced EL (e.g. when changing CL client). That said, this does go against the implied semantics of the spec. @dannyryan will put up a PR to clarify & we'll discuss further on the ACDC call next week.
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa @tbenr @dannyryan And, lastly... well, aside from the blob limit debate pt II which I summarized earlier!, @BarnabasBusa announced a first coordination call around the launch of a new testnet: Holesky

github.com/ethereum/pm/is…
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa @tbenr @dannyryan Holesky aims to run more validators than are currently on mainnet, to allow us to stress test Beacon chain-related changes. Rough ETA for the launch is Merge Day (Sept 15) - if you're into testnets, you should show up 😄!
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa @tbenr @dannyryan And that was it! Next ACDE is scheduled for June 22, 14:00 UTC. Until then, see you at the 4844, EOF, Holesky and ACDC calls 🙃
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa @tbenr @dannyryan Oh and one more thing: we'll be hosting an Ethereum Protocol Fellowship Town Hall next Monday at 16:30 UTC. If you're potentially interested in going down the protocol development rabbit hole, you should show up 😄

Info here: blog.ethereum.org/2023/06/01/eth…
@ethereum @dankrad @christine_dkim @vdWijden @BarnabasBusa @tbenr @dannyryan 1153: store data, delete at end of txn -> cheaper
4788: add data beacon data chain in EVM, less trust assumption for staking pools
4844: store data, delete after 3 weeks, cheaper rollup txns
5656: cool new opcode
6780: remove SELFDESTRUCT, reduce breakage

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with timbeiko.eth

timbeiko.eth Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @TimBeiko

May 25
Another @ethereum #ACDE today! We covered SELFDESTRUCT removal, 4844 spec changes, opcode management and potential final Cancun additions 🏖️

Agenda: github.com/ethereum/pm/is…
Stream:

Recap below 😄
@ethereum First on the call, we had the @dedaub team share the impact analysis they did around SELFDESTRUCT removal: docs.google.com/document/d/1HD…

Their presentation was thorough and accessible - recommend the livestream if you want to get the full picture 😄
@ethereum @dedaub At a high level, they were tasked with determining what would break if SELFDESTRUCT semantics changed, and whether trying to accommodate certain breaking cases would be worthwhile. Image
Read 30 tweets
May 11
Had another @Etherum #ACDE call today: most of it focused on 4844, with some brief discussion of L2 EIPs, and overall Cancun planning 🏖️

Agenda: github.com/ethereum/pm/is…
Stream: youtube.com/live/s6q5z53SI…

Recap below 👇
@Etherum On the 4844 front, we first discussed some issues with the input format to the precompile. They use little-endian, which isn't used on the EL (but is the default on the CL), while the output is big endian, the default for the EL.
@Etherum @yperbasis asked if we could harmonize this, ideally using big endian to match the rest of the EL. After some discussion, we agreed to move forward with this! We'll open a PR to the spec and merge it if no objections come up ✅
Read 25 tweets
Apr 27
We wrapped up @ethereum ACDE 160 just now - lots of discussion and decisions about Cancun, the next upgrade.

Agenda: github.com/ethereum/pm/is…
Stream: youtube.com/live/ajLQVC3E_…

Recap below 👇
@ethereum Full tweetstorm will be a bit delayed today, but here's a short summary of the call, from the R&D discord: Image
@ethereum And here is the PR reflecting the changes mentioned above: github.com/ethereum/execu…

The @EthMagicians thread for the fork has also been updated 🧙‍♀️

ethereum-magicians.org/t/cancun-netwo…

Full recap 🔜
Read 28 tweets
Mar 30
We wrapped up another @ethereum #ACDE today: covered Shapella, EOF, SELFDESTRUCT, EL -> CL state access, local block building & verkle tries 🌳

Agenda: github.com/ethereum/pm/is…
Recording:

Recap below 👇
@ethereum First, Shapella is coming! The announcment came out earlier this week:
@ethereum Note that @ErigonEth has had a version update since the initial announcement:

2.42.0 is what you want to be running if you use the client!
Read 30 tweets
Mar 30
Looking at the numbers, it seems like about 2/3rd of funds allocated to client teams went to the *teams* vs. 1/3rd to PG (individuals) 👀

Results skew more towards individuals if you add the 4844 collection, which had some interesting pushback: gov.optimism.io/t/feedback-on-…
Not sure how explicit badge holders where about these splits, but it seems reasonable? Could argue that individuals vs. teams should be closer to 50-50, or maybe flip to 2/3rd towards individuals (idk what's best!), but it's encouraging to not see a 10x skew either way!
The results of this round have made me more optimistic about public goods "interop": it feels more like "legos" than "competition", and I think it's worthwhile to keep going that route to allow capital allocators to mix & match as they please 🧱
Read 4 tweets
Mar 30
@optimismFND I also like that both @ProtocolGuild and client teams can get allocations: PG goes directly to individuals, and some of them who fall between clearly delineated teams, and most teams' funding go back to the "org", which helps pay for both the engineers, but also everyone else!
@optimismFND @ProtocolGuild We started PG in part because ~every funding system in the space is biased towards orgs vs. individuals, and so it's great to see something like RPGF allocating to both ends of the spectrum 😄
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(