My understanding of the TLS 1.3 protocol is that the client authenticates the server by checking the public key in the certificate sent by the server. Before a client connects, the operating system typically has to do a DNS lookup of the server’s domain to know what address the client should connect to.
If DNSSEC is known to be used by the operating system instead of plain DNS to look up the server’s domain, and if DNSSEC returns the server’s public key along with the server’s domain and address (or say the entire certificate) for caching by the operating system, then it would be unnecessary for the server to supply its certificate during the TLS handshake, since the client could supposedly fetch it from the DNS data cached by the operating system, correct?