Disclosure: Critical vulnerabilities fixed in LND 0.19.0

The general weakness in LND was that transaction fees could be manipulated to stay too low, and the reaggregation+rebroadcast period was infrequent (once every two blocks). As a result, an attacker could pull off the attack for cheap. At the time I looked at other implementations and found their fees couldn’t be manipulated this way, and they generally responded to double spends immediately after confirmation. But I think there certainly is much that can be improved about other implementations’ fee bumping strategies to protect against replacement cycling and similar attacks in general.

Yes, though 90 days may be a bit aggressive when so much money is at risk. Especially for LND, which has historically had a lot of upgrade friction. Perhaps 6 months is a better disclosure timeline.

Perhaps this would be beneficial. I’ve also long thought that LN implementations are barking up the wrong tree with all these force close fee optimizations. Getting too fancy in this area inevitably leads to vulnerabilities. Perhaps we should focus on making force closes less frequent (e.g., by reducing state machine bugs, implementing 0-fee commitments) rather than saving ~30% or less on fees by batching.