DNSSEC and DANE

- OTHER

Method of validating a DNS response against a trusted root server. Mitigates various attacks that could reroute a user to a fake site while showing the real URL for the original site.

Chrome

  1. 4 - 5: Partial support
  2. 6 - 30: Partial support
  3. 31 - 123: Partial support
  4. 124: Partial support
  5. 125 - 127: Partial support

Edge

  1. 12 - 123: Partial support
  2. 124: Partial support

Safari

  1. 3.1 - 17.3: Partial support
  2. 17.4: Partial support
  3. 17.5 - TP: Partial support

Firefox

  1. 2 - 124: Partial support
  2. 125: Partial support
  3. 126 - 128: Partial support

Opera

  1. 9 - 108: Partial support
  2. 109: Partial support

IE

  1. 5.5 - 10: Partial support
  2. 11: Partial support

Chrome for Android

  1. 124: Partial support

Safari on iOS

  1. 3.2 - 17.3: Partial support
  2. 17.4: Partial support
  3. 17.5: Partial support

Samsung Internet

  1. 4 - 23: Partial support
  2. 24: Partial support

Opera Mini

  1. all: Partial support

Opera Mobile

  1. 10 - 12.1: Partial support
  2. 80: Partial support

UC Browser for Android

  1. 15.5: Partial support

Android Browser

  1. 2.1 - 4.4.4: Partial support
  2. 124: Partial support

Firefox for Android

  1. 125: Partial support

QQ Browser

  1. 14.9: Partial support

Baidu Browser

  1. 13.52: Partial support

KaiOS Browser

  1. 2.5: Partial support
  2. 3: Partial support

Browsers have generally decided to not implement DNSSEC validation because the added complexity outweighs the improvements to the browser. DNSSEC is still useful as it is widely used to protect delivery of records between DNS servers, only failing to protect the delivery from the last DNS server to the browser.

Certificate transparency is widely used and tries to provide the same security as DNSSEC but by very different means.

Resources:
Chrome implementation bug
Firefox implementation bug
Wikipedia - DNSSEC