I need some help! A few users are reporting the following when accessing certain URLS via IE7 pointed to NBM 3.9SP1 server running NW65 SP7:

HTTP ERROR
Status: 502 Bad Gateway
Description: Mal-formed reply from origin server.


The problem can be seen when clicking on the "continue shopping" or "check out" link in KODAK Gallery

The problem does not occur with Firefox or when pointed to another non-NBM proxy.

The proxy.cfg being used is listed below. We were using one of Craig Johnson's proxy.cfg files but ran into some odd problems... Novell support provided the proxy.cfg below which seemed to solve those other problems.

proxy.cfg:
[MiniWeb Server]
Port-Number=1959
Root-Directory=SYS:\ETC\PROXY\DATA

[MiniWeb Server: Mime Types]
Content-Type: text/html=htm,html
Content-Type: text/plain=txt,text,cla,class
Content-Type: image/gif=gif
Content-Type: image/jpeg=jpg,jpeg,jpe,jfif,pjpeg,pjp
Content-Type: image/tiff=tiff,tif
Content-Type: image/x-xbitmap=xbm
Content-Type: video/x-msvideo=avi
Content-Type: video/quicktime=qt,mov,moov
Content-Type: video/x-mpeg2=mpv2,mp2v
Content-Type: video/mpeg=mpeg,mpg,mpe,mpv,vbs,mpegv
Content-Type: audio/x-pn-realaudio=ra,ram
Content-Type: audio/x-mpeg=mpega,mp2,mpa,abs
Content-Type: audio/x-wav=wav
Content-Type: audio/x-aiff=aif,aiff,aifc
Content-Type: application/x-ns-proxy-autoconfig=pac
Content-Type: text/javascript
Content-Type: application/x-javascript


[Extra Configuration]
AckWithNoDataOnSYN=1
AllowGTCPProxyToUsePort25=1
AllowSecond220Respond=1
CodeRedWorkAround=1
DiscardAcceptRanges=1
DonotCache4ContEncoding=1
DoNotCacheWhenCookieFound=1
DoNotCreateFullyQualifiedHostNames=0
DoNotResolveNamesBeforeGoingThruHierarchy=1
DoNotSaveMemoryCacheDuringUnload=1
DoNotSendExtraCRLF=1
DonotSendIPToACL=1
EnableActiveFTP=1
EnableICSPassThruFix=1
EnableIncomplete302ResponseFix=1
EnableNoCachePassThru=1
HTTPSAuthenticationSwitch=0
IcpBypassOrigin=1
IgnoreContentLengthCheck=1
IgnoreDuplicateChill=1
Line_Terminator=CR
new302Redirect=1
NoDummySlashUpstream=1
noRetryIfPragmaNoCacheHeaderPresent=1
OC_IgnoreContentLengthFlag=1
#PassContentLength=0
ResBadAddressLoopBreak=1
ResolveProxyIPAddress=0
RestartTimeoutAfterEverySend=1
SCacheDestroyYieldInterval=200
ScanVirusPatterns=1
SendHTTP11Request=1
SkipHttpReplyHeaderCaseChange=1
TransparentProxySupportsVirtualServers=1
TreatLeftArrowAsHeaderBodySeparator=0
TurnOffPersistantPassThru=1
UseSimplifiedErrorPage=1

#######################
#bm39sp1 added options:
#enableCacheInVersionDowngrade=1
#EnableAcceptEncoding=1
#GraceLoginNotification=1
#GraceLoginText=Enter a customization grace login text here
#PwdChangeURL=Enter the URL for changing the password
#skipAuthForViaHeader=1
#fixSecondTimeScheduling=1
#######################

[TransparentHTTPS]
HTTPSPort1=443

[BM Cookie]
BM_Forward_Cookie=0

[Object Cache]
cut thru no CLH length=0
disk management factor=4000

[Log Format]
Delimiter-Character=space

[HTTP Streaming]
ResetOriginServerConnAfterClientReset=1

[Tunneling]
EnableTunnelingControl=1
EnableTunnelingControlLog=0

[HttpTunnelingAllowed]
; the example entries below allow ports 443, 444 (often specified
; for SSL Proxy Authenticaiton, 8009 (for NRM), 2200 (Apache Web Manager
; and 52443 (for iFolder) to be tunneled. Port 443 is enabled by default.
;port<x>=<port #>
port1=8009
port2=52443
port3=2200
; use 444 for ssl proxy authentication
port4=444
; allow 1494 thru for Citrix apps in browsers
port5=1494
;;added by jwf
port6=21459
port7=21457
port8=21450
;added per wo for lily rice access to UA
port9=8443

[Virus Pattern Configuration]
MaxNoOfVirusPatterns=28
NoOfVirusPatterns=28
PatternSize=16
EnableAutoPatternUpdate=1
PatternStartOffset=1
VirusPattern0=scripts/..%252f.
VirusPatternoffset10=0
VirusPatternvalue10=0
VirusPatternoffset20=0
VirusPatternvalue20=0
VirusPatternorigLength0=57
VirusPattern1=scripts/..%c1%1c
VirusPatternoffset11=0
VirusPatternvalue11=0
VirusPatternoffset21=0
VirusPatternvalue21=0
VirusPatternorigLength1=58
VirusPattern2=scripts/..%c0%2f
VirusPatternoffset12=0
VirusPatternvalue12=0
VirusPatternoffset22=0
VirusPatternvalue22=0
VirusPatternorigLength2=58
VirusPattern3=scripts/..%c0%af
VirusPatternoffset13=0
VirusPatternvalue13=0
VirusPatternoffset23=0
VirusPatternvalue23=0
VirusPatternorigLength3=58
VirusPattern4=scripts/..%%35c.
VirusPatternoffset14=0
VirusPatternvalue14=0
VirusPatternoffset24=0
VirusPatternvalue24=0
VirusPatternorigLength4=57
VirusPattern5=scripts/root.exe
VirusPatternoffset15=0
VirusPatternvalue15=0
VirusPatternoffset25=0
VirusPatternvalue25=0
VirusPatternorigLength5=33
VirusPattern6=MSADC/root.exe?/
VirusPatternoffset16=0
VirusPatternvalue16=0
VirusPatternoffset26=0
VirusPatternvalue26=0
VirusPatternorigLength6=31
VirusPattern7=d/winnt/system32
VirusPatternoffset17=0
VirusPatternvalue17=0
VirusPatternoffset27=0
VirusPatternvalue27=0
VirusPatternorigLength7=41
VirusPattern8=c/winnt/system32
VirusPatternoffset18=0
VirusPatternvalue18=0
VirusPatternoffset28=0
VirusPatternvalue28=0
VirusPatternorigLength8=41
VirusPattern9=_mem_bin/..%255c
VirusPatternoffset19=0
VirusPatternvalue19=0
VirusPatternoffset29=0
VirusPatternvalue29=0
VirusPatternorigLength9=78
VirusPattern10=_vti_bin/..%255c
VirusPatternoffset110=0
VirusPatternvalue110=0
VirusPatternoffset210=0
VirusPatternvalue210=0
VirusPatternorigLength10=78
VirusPattern11=msadc/..%255c../
VirusPatternoffset111=0
VirusPatternvalue111=0
VirusPatternoffset211=0
VirusPatternvalue211=0
VirusPatternorigLength11=106
VirusPattern12=scripts/..%%35%6
VirusPatternoffset112=0
VirusPatternvalue112=0
VirusPatternoffset212=0
VirusPatternvalue212=0
VirusPatternorigLength12=59
VirusPattern13=scripts/..%25%35%
VirusPatternoffset113=0
VirusPatternvalue113=0
VirusPatternoffset213=0
VirusPatternvalue213=0
VirusPatternorigLength13=61
VirusPattern14=scripts/..%255c..
VirusPatternoffset114=0
VirusPatternvalue114=0
VirusPatternoffset214=0
VirusPatternvalue214=0
VirusPatternorigLength14=57
VirusPattern15=scripts/..%c1%9c.
VirusPatternoffset115=0
VirusPatternvalue115=0
VirusPatternoffset215=0
VirusPatternvalue215=0
VirusPatternorigLength15=58
VirusPattern16=scripts/root.exe
VirusPatternoffset116=0
VirusPatternvalue116=0
VirusPatternoffset216=0
VirusPatternvalue216=0
VirusPatternorigLength16=81
VirusPattern17=scripts/httpodbc
VirusPatternoffset117=0
VirusPatternvalue117=0
VirusPatternoffset217=0
VirusPatternvalue217=0
VirusPatternorigLength17=30
VirusPattern18=MSADC/root.exe?/
VirusPatternoffset118=0
VirusPatternvalue118=0
VirusPatternoffset218=0
VirusPatternvalue218=0
VirusPatternorigLength18=79
VirusPattern19=MSADC/httpodbc.d
VirusPatternoffset119=0
VirusPatternvalue119=0
VirusPatternoffset219=0
VirusPatternvalue219=0
VirusPatternorigLength19=28
VirusPattern20="c/httpodbc.dll H"
VirusPatternoffset120=0
VirusPatternvalue120=0
VirusPatternoffset220=0
VirusPatternvalue220=0
VirusPatternorigLength20=24
VirusPattern21=d/winnt/system32
VirusPatternoffset121=0
VirusPatternvalue121=0
VirusPatternoffset221=0
VirusPatternvalue221=0
VirusPatternorigLength21=92
VirusPattern22="d/httpodbc.dll H"
VirusPatternoffset122=0
VirusPatternvalue122=0
VirusPatternoffset222=0
VirusPatternvalue222=0
VirusPatternorigLength22=24
VirusPattern23=scripts/..%255c.
VirusPatternoffset123=0
VirusPatternvalue123=0
VirusPatternoffset223=0
VirusPatternvalue223=0
VirusPatternorigLength23=108
VirusPattern24=scripts/.%255c..
VirusPatternoffset124=0
VirusPatternvalue124=0
VirusPatternoffset224=0
VirusPatternvalue224=0
VirusPatternorigLength24=39
VirusPattern25=scripts/..%252f.
VirusPatternoffset125=0
VirusPatternvalue125=0
VirusPatternoffset225=0
VirusPatternvalue225=0
VirusPatternorigLength25=116
VirusPattern26=scripts/..%252f.
VirusPatternoffset126=0
VirusPatternvalue126=0
VirusPatternoffset226=0
VirusPatternvalue226=0
VirusPatternorigLength26=39
VirusPattern27=default.ida?XXXX
VirusPatternoffset127=0
VirusPatternvalue127=0
VirusPatternoffset227=0
VirusPatternvalue227=0
VirusPatternorigLength27=385