RFC 6698 states that a TLSA record should be ignored unless it can be verified with DNSSEC. For clients using a built-in stub resolver, that means checking the AD bit on the response (and trusting that the administrator has pointed the resolver at a non-compromised DNSSEC capable resolver).
However, in many organizations that resolver also hosts internal views of the organization's own zones and will reply with an AA flag (and no AD flag). Does that mean that it is useless to put a TLSA record in such a zone because clients are prohibited from trusting them? Or can I expect that the client (browser) will do its own DNSSEC validation for TLSA records, using non-recursive queries and treating the local resolver as any other authoritative server?
(In the specific case I'm looking at we are trying to access an external service using an internal name, and for business reasons we cannot add the internal name to the TLS certificate on the external server).
Running a full caching resolver on all client machines would be a solution, but not feasible for us. I am aware that TLSA checking is not even active in most browsers, but I'd like to be prepared for when it is.