Here's another fun one. Occasionally during an HTTP authentication, a client browser will initiate a new HTTP request for the proxy's favicon.ico file. The proxy will reply with an authentication redirect and after a negotiation resulting in the client providing its kerberos ticket, the proxy will redirect back to the favicon.ico file. The client requests it again, and the process starts over. This results in dozens of loops per client.
Nearly all browsers here are IE11, so that's the only user-agent I've seen. In a given 5-minute packet capture I'll see two or three clients exhibit this behavior.
I've only ever seen this with HTTP sessions, not HTTPS, but I suspect that's only because of the difficulty of decrypting the sessions in Wireshark. I did experiment with a workstation on which I limited the cipher suites to only one that I can decrypt. I wasn't able to replicate the behavior though.
Combined with this, the proxy makes dozens of DNS queries to resolve its own IWA auth virtual URL. For example, in our case the http auth virtual URL is "http://proxysg". When a client requests "http://proxysg/favicon.ico", the proxy tries to resolve that name. Since our DNS doesn't have an entry for the host without a domain suffix, the query fails and the server responds with a server failure reply code.
And while looking specifically at DNS traffic from the proxy, it's also making frequent queries for the names "ssl" and "https". I haven't found a cause for this behavior yet though.