You do realise that you've tested the Let's Encrypt OCSP server with that command, right? And not your server?
Akamai sends the root certificate in its chain of certificate. This isn't required and just makes the TLS handshake bigger in size. Root certificates are meant to be self-signed. Nothing strange there.
I have no idea, that's probably something you'd be searching on Google with IIS 10 OCSP stapeling and such keywords..
Yes, I was testing to see if my server was firewalled or otherwise blocked from communicating to LE since the server initiates the revocation check. The “no response” tells me (I’m assuming) that I was able to connect but the LE server sent no data…? Didn’t know about the root cert, thanks for that.
No, it just means the OCSP servers aren't stapling an OCSP response for their own certificate themselves. You didn't actually request an OCSP request for a certain certificate. You just made a TLS connection to the OCSP server and checking if it send an stapled OCSP response, which it didn't. Requesting an OCSP response from the OCSP server is done in another matter. So you can't make any conclusions about whether your server can receive OCSP responses for your certificate with that command.
OIC. Thank you for that link, I will be doing more reading! My cert does have the info it needs (see below) so I just have to figure out why Windows isn’t doing it.
[1]Authority Info Access
Access Method=On-line Certificate Status Protocol (1.3.6.1.5.5.7.48.1)
Alternative Name:
URL=http://ocsp.int-x3.letsencrypt.org
Perfect, exactly what I needed, thanks so much! I also read through the previous page at raymii.org and was able to do a manual test once I figured out that SNI requires an extra parameter: