Filippo Valsorda makes an excellent case about exposing your go service. This blogpost will only talk about one little piece of all this, namely timeouts. Timeouts are one of the rare cases where the default values aren’t secure in golang. This is mostly due to historical reasons and maintaining backwards compatibility, however the often used helper methods
http.ListenAndServeTLS are vulnerable to DoS (Denial of Service) or EDoS (Economic Denial of Sustainability) attacks because they use no timeouts. Thus, clients can keep the connections open and your server will run out of connections once the file descriptors run out.
http.Server offers you three types of timeouts:
ReadTimeout does specify the time until the body is read (if you don’t read the body it’s defined as the time until the headers are read).
WriteTimeout is defined as the maximum duration before timing out writes. It is reset every time you read a new header. Lastly,
IdleTimeout is used to limit the time keep-alive connections are allowed to be idle.
These three timeouts should definitely be set when you open your service to the internet, but will also provide helpful on an internal service. You can easily use an
http.Server instead of calling
When you use these timeouts, the server will close the connection once these timeouts are exceeded. Browsers like Firefox might go for a retry immediately, clients like
curl will just exit with an error. If you want to close the connection properly, you can wrap all your handlers in
http.TimeoutHandler. This allows you to send a response body with an actual error code if your application is choking internally.
Continue with Part 3: Passwords, Tokens and Secrets.