From my side, I now see 3 ???
s between the CPE and your IP address, which is also responding, so that's great.
Can your friend do something like curl -vvv https://drkt.eu
or whatever to see if the time out happens before/after SSL handshake etc.? Also, do they have any firewalls / security appliances configured to filter content? I'd be curious to see dig
or nslookup
result, ping
or traceroute
result, and curl -vvv
result, just to understand where it is breaking down.
Also, do you have a login to your ISP's equipment? Are you able to set it to bridge mode to bypass it altogether? Just throwing ideas out there, to see if there is anything else on the go. That cpe
device is also pretty curious for sure.
Edit: Also, if they can get a response from ping, then it is probably not routing, but something else on the connection to the service / port itself. That's what I'm hoping we can figure out from the various outputs.
For anyone who doesn't know, egress is already free if you route it through CloudFlare's Bandwidth Alliance Program from a few years back. If you are already using this setup, there doesn't appear to be any up side to this up coming change (other than the bill).