https://en.wikipedia.org/wiki/DNS-based_Authentication_of_Na...
With certificates we’re doing multi perspective validation.
DNS root of trust is silly. DNSSEC is not a proper root of trust
If your domain register or DNS provider is compromised in any way, all of the bullcrud the CA/B demands of certificates is entirely meaningless, the bad actor can legitimately request certificates.
But think about what DANE is for a second. If a bad actor is MITMing your connection to some endpoint, they certainly can MITM your DNS queries too.
DANE isn't going to be of any value when an attacker is sitting between the end user and their ISP - which was already the requirement for compromising the TLS connection in the first place - as they could just strip DNSSEC and fake the DANE records.