Description
What is the problem this feature will solve?
Node 18 introduced these two settings in order to prevent (D)DoS attacks. That's great!
But we had a very hard few days figuring out that these timeouts result in some 408 reported in our Google Cloud Run services.
I suspect that something triggers these timeouts in the communication between Cloud Run (a managed KNative service) and our Express app. Cloud Run reported these 408 errors with a request duration of a few ms and so the timeout hasn't been reached. And we never saw timeouts with Node 16. (We are currently running everything in our CI, so we have full control over the clients and servers and monitor every failed request.)
Either there is something wrong in the implementation of these timeouts or they in general do not work particularly well together with a reverse proxy.
What is the feature you are proposing to solve the problem?
I don't know, how many Node HTTP servers are exposed to the web without a reverse proxy.
I would want you to consider disabling these timeouts by default and to add some kind of logging or notification when these timeouts happen. We were completely in the dark for a couple of days.
What alternatives have you considered?
No response