DNSSEC and DANE
- OTHERMethod of validating a DNS response against a trusted root server. Mitigates various attacks that could reroute a user to a fake site while showing the real URL for the original site.
Chrome
- ◐ 4 - 5: Partial support
- ◐ 6 - 30: Partial support
- ◐ 31 - 130: Partial support
- ◐ 131: Partial support
- ◐ 132 - 134: Partial support
Edge
- ◐ 12 - 130: Partial support
- ◐ 131: Partial support
Safari
- ◐ 3.1 - 18.0: Partial support
- ◐ 18.1: Partial support
- ◐ 18.2 - TP: Partial support
Firefox
- ◐ 2 - 131: Partial support
- ◐ 132: Partial support
- ◐ 133 - 135: Partial support
Opera
- ◐ 9 - 113: Partial support
- ◐ 114: Partial support
IE
- ◐ 5.5 - 10: Partial support
- ◐ 11: Partial support
Chrome for Android
- ◐ 131: Partial support
Safari on iOS
- ◐ 3.2 - 18.0: Partial support
- ◐ 18.1: Partial support
- ◐ 18.2: Partial support
Samsung Internet
- ◐ 4 - 25: Partial support
- ◐ 26: Partial support
Opera Mini
- ◐ all: Partial support
Opera Mobile
- ◐ 10 - 12.1: Partial support
- ◐ 80: Partial support
UC Browser for Android
- ◐ 15.5: Partial support
Android Browser
- ◐ 2.1 - 4.4.4: Partial support
- ◐ 131: Partial support
Firefox for Android
- ◐ 132: Partial support
QQ Browser
- ◐ 14.9: Partial support
Baidu Browser
- ◐ 13.52: Partial support
KaiOS Browser
- ◐ 2.5: Partial support
- ◐ 3: Partial support
Browsers have generally decided to not implement DNSSEC validation because the added complexity outweighs the improvements to the browser. DNSSEC is still useful as it is widely used to protect delivery of records between DNS servers, only failing to protect the delivery from the last DNS server to the browser.
Certificate transparency is widely used and tries to provide the same security as DNSSEC but by very different means.