Michal 'vorner' Vaner wrote:
DROP causes the packet to get blackholed without a trace. It sometimes
happens to packets on internet so it is usual to try again and again
until it succeeds or timeout (usually in tens of seconds) is reached.

That was the intention. The site in question is my banks site. And they have a marketing survey company linked to their site which I want to hide from. If I want to use the banks internet services, which I pay for, I don't want third parties to snoop on my activities...

I read somewhere that the default timeout for a SYN request is 2 minutes.

Does this help?

I tried doing what you suggested:

iptables -A OUTPUT/INPUT -m iprange --src-range 66.235.128.0-66.235.159.255 -j REJECT

iptables -A OUTPUT/INPUT -m iprange --dst-range 66.235.128.0-66.235.159.255 -j REJECT

This should REJECT from both ends, no? But netstat says the connection is established anyway...

With DROP it worked for the first page (it never showed up as SYN_SENT). But when I logged (with DROP) in there would still be a SYN_SENT on port 443 (SSL) and firefox would wait for timeout.

Have a nice help

Thanks!

FYI, I tried using a firefox extension called Siteblock but it doesn't work for "third party" access, only direct, it seems...

Best regards

Peter K

Reply via email to