@@ -1332,8 +1332,8 @@ <h2>Origins with multiple IP addresses</h2>
1332
1332
As an example, assume that < code > example.com</ code > is handled by three
1333
1333
< a > servers</ a > , each with a different IP address. The owner of the
1334
1334
service configures DNS to resolve < code > example.com</ code > to
1335
- < code > 192.168.0. 1</ code > , < code > 192.168.0 .2</ code > , and
1336
- < code > 192.168.0 .3</ code > , and relies on user agents to balance their
1335
+ < code > 192.0.2. 1</ code > , < code > 192.0.2 .2</ code > , and
1336
+ < code > 192.0.2 .3</ code > , and relies on user agents to balance their
1337
1337
requests across these three IP addresses. The service owner delivers
1338
1338
the following < a > NEL policy</ a > :
1339
1339
</ p >
@@ -1357,11 +1357,11 @@ <h2>Origins with multiple IP addresses</h2>
1357
1357
< ol >
1358
1358
< li >
1359
1359
< p >
1360
- The user agent sends a < a > request</ a > to < code > 192.168.0 .1</ code > ,
1360
+ The user agent sends a < a > request</ a > to < code > 192.0.2 .1</ code > ,
1361
1361
and receives a successful < a > response</ a > from the < a > server</ a > .
1362
1362
This response includes the above < a > NEL policy</ a > , and the user
1363
1363
agent sets the policy's < a > received IP address</ a > to
1364
- < code > 192.168.0 .1</ code > . Since the < a > received IP address</ a >
1364
+ < code > 192.0.2 .1</ code > . Since the < a > received IP address</ a >
1365
1365
matches the < a > server</ a > 's IP address (which it must for any
1366
1366
successful request), it generates the following NEL report:
1367
1367
</ p >
@@ -1373,7 +1373,7 @@ <h2>Origins with multiple IP addresses</h2>
1373
1373
"url": "https://example.com/",
1374
1374
"body": {
1375
1375
"sampling_fraction": 1.0,
1376
- "server_ip": "192.168.0 .1",
1376
+ "server_ip": "192.0.2 .1",
1377
1377
"protocol": "http/1.1",
1378
1378
"method": "GET",
1379
1379
"status_code": 200,
@@ -1387,10 +1387,10 @@ <h2>Origins with multiple IP addresses</h2>
1387
1387
< li >
1388
1388
< p >
1389
1389
The user agent sends a new < a > request</ a > to
1390
- < code > 192.168.0 .2</ code > , and receives another successful
1390
+ < code > 192.0.2 .2</ code > , and receives another successful
1391
1391
< a > response</ a > . This response also includes the < a > NEL policy</ a > ,
1392
1392
and the user agent updates the policy's < a > received IP address</ a >
1393
- to < code > 192.168.0 .2</ code > . Since the < a > received IP address</ a >
1393
+ to < code > 192.0.2 .2</ code > . Since the < a > received IP address</ a >
1394
1394
matches the < a > server</ a > 's IP address (which it must for any
1395
1395
successful request), it generates the following NEL report:
1396
1396
</ p >
@@ -1402,7 +1402,7 @@ <h2>Origins with multiple IP addresses</h2>
1402
1402
"url": "https://example.com/",
1403
1403
"body": {
1404
1404
"sampling_fraction": 1.0,
1405
- "server_ip": "192.168.0 .2",
1405
+ "server_ip": "192.0.2 .2",
1406
1406
"protocol": "http/1.1",
1407
1407
"method": "GET",
1408
1408
"status_code": 200,
@@ -1416,14 +1416,14 @@ <h2>Origins with multiple IP addresses</h2>
1416
1416
< li >
1417
1417
< p >
1418
1418
The user agent then tries to send a < a > request</ a > to
1419
- < code > 192.168.0 .3</ code > , but isn't able to establish a connection
1419
+ < code > 192.0.2 .3</ code > , but isn't able to establish a connection
1420
1420
to the server. The user agent still has the < a > NEL policy</ a > in
1421
1421
the < a > policy cache</ a > , and would ideally use this policy to
1422
1422
generate a < code > tcp.timed_out</ code > report about the < a > failed</ a >
1423
1423
< a > network request</ a > . However, the because policy's < a > received
1424
- IP address</ a > (< code > 192.168.0 .2</ code > ) doesn't match the IP
1424
+ IP address</ a > (< code > 192.0.2 .2</ code > ) doesn't match the IP
1425
1425
address that this < a > request</ a > was sent to, the user agent cannot
1426
- verify that the server at < code > 192.168.0 .3</ code > is actually owned
1426
+ verify that the server at < code > 192.0.2 .3</ code > is actually owned
1427
1427
by the owners of < code > example.com</ code > . The user agent must
1428
1428
therefore downgrade the report to < code > dns.address_changed</ code > :
1429
1429
</ p >
@@ -1435,7 +1435,7 @@ <h2>Origins with multiple IP addresses</h2>
1435
1435
"url": "https://example.com/",
1436
1436
"body": {
1437
1437
"sampling_fraction": 1.0,
1438
- "server_ip": "192.168.0 .3",
1438
+ "server_ip": "192.0.2 .3",
1439
1439
"protocol": "http/1.1",
1440
1440
"method": "GET",
1441
1441
"status_code": 0,
@@ -1449,12 +1449,12 @@ <h2>Origins with multiple IP addresses</h2>
1449
1449
< li >
1450
1450
< p >
1451
1451
The user agent then tries to send another < a > request</ a > to
1452
- < code > 192.168.0 .1</ code > , but once again isn't able to establish a
1452
+ < code > 192.0.2 .1</ code > , but once again isn't able to establish a
1453
1453
connection to the server. Even though the user agent received the
1454
- < a > NEL policy</ a > from < code > 192.168.0 .1</ code > at some point in the
1454
+ < a > NEL policy</ a > from < code > 192.0.2 .1</ code > at some point in the
1455
1455
past, the policy's < a > received IP address</ a > only records where it
1456
1456
was < em > most recently</ em > received from — in this case,
1457
- < code > 192.168.0 .2</ code > . The user agent must therefore downgrade
1457
+ < code > 192.0.2 .2</ code > . The user agent must therefore downgrade
1458
1458
the report to < code > dns.address_changed</ code > :
1459
1459
</ p >
1460
1460
@@ -1465,7 +1465,7 @@ <h2>Origins with multiple IP addresses</h2>
1465
1465
"url": "https://example.com/",
1466
1466
"body": {
1467
1467
"sampling_fraction": 1.0,
1468
- "server_ip": "192.168.0 .1",
1468
+ "server_ip": "192.0.2 .1",
1469
1469
"protocol": "http/1.1",
1470
1470
"method": "GET",
1471
1471
"status_code": 0,
0 commit comments