[CAP-64] Memo Authorization for Soroban #1610
Replies: 5 comments 9 replies
-
Thanks. This seems like an important thing to fix given that developers are working on smart wallets and there's currently no way to attach a memo to their invocations. Some prior art here: #1534
|
Beta Was this translation helpful? Give feedback.
-
The coupling of the auth memo to the tx memo is very limiting, but it's also very convenient since integrators can continue to rely on the tx memo field. It's the right tradeoff I think for a surgical change to support transfers to anchors and CEXs using auth sigs. The worst part of the limitation is that it will be difficult to decouple them in the future because downstream systems will be dependent on the coupling itself. But I think the actual impact will be small, because future expansion will probably be focused on muxed accounts rather than making memos more flexible. I'm a 👍🏻. Definitely keen to hear @earrietadev thoughts. Minor comments:
What makes it unsafe? I don't think this is inherently unsafe. Awkward maybe, annoying yes.
The CAP's abstract looks incomplete. |
Beta Was this translation helpful? Give feedback.
-
To be honest after seeing so many users having issues with memos (every now and then we receive some user that forgot to add a memo when sending to an exchange and it needs support) I believe it might be better if we just avoid it and instead we try to move the exchanges in the direction of just using contracts for receiving payments. Making it so it's compatible with smart wallets I feel what it will cause is that exchanges will never stop using memos... Now that being said, this CAP will make my life easier with the smart wallet version of xBull because I was going to go with the middle account route and with this CAP I won't need to do that |
Beta Was this translation helpful? Give feedback.
-
I'm with @leighmcculloch. This is not the most elegant solution but it deals with the exact scenario we need to fix with a solution that appears to have minimum downstream impact (@mollykarcher please keep us honest here). @earrietadev I'd love to see exchanges migrate away from memos but what we see repeatedly is an aversion to any type of change from these players. Yes, this might force them to move to smart contracts but it also might make them just not support smart wallets altogether.
What would that look like? Is this a 3rd party account that takes custody of a user's funds in-flight? |
Beta Was this translation helpful? Give feedback.
-
I think the XDR changes can be reduced, but whether that simplifies or complicates the resulting XDR is debatable. I think we could remove the The proposal requires the credentials.memo and tx.memo to match, which means it is very unlikely anyone will read credentials.memo. Most entities already ingesting txs will continue to read the tx.memo. The proposal says that the old
Whether that change simplifies or complicates is subtle. It results in the final XDR having less variations, but it requires signers to know which preimage to build for signing. But, signers already need to know which preimage to sign, so the complexity cost is the same. It could be argued that it's more complex because the wallet has to produce a payload that it doesn't already have in complete form in the tx, but that's no different to tx signature payloads which sdks produce, so again this doesn't seem more complex than the ecosystem already handles. |
Beta Was this translation helpful? Give feedback.
-
This is a discussion thread for CAP-64 - Memo Authorization for Soroban.
Beta Was this translation helpful? Give feedback.
All reactions