If Require Server Name Indication is checked on the binding of an IIS site, OCSP stapling is disabled for the site.
This is easily confirmed by enabling SNI for a site that currently doesn't require it, and checking using https://www.ssllabs.com/ssltest/ or openssl:
openssl s_client -connect foobar.com:443 -servername foobar.com -tls1 -tlsextdebug -status
Does anyone have a workaround for this so that clients of SNI-enabled sites can enjoy the benefits of OCSP stapling?
According to Microsoft this behavior is disabled by default, because of potential performance issues.
Powershell snippet:
Microsoft reference article, the article concerns windows 2012 server, i have tested this, and it is still relevant for 2016 aswell.
Create a DWORD reg value
EnableOcspStaplingForSni
underHKLM\System\CurrentControlSet\Control\SecurityProviders\Schannel\
and set it to a non-zero value.