Naenara (web browser)

from Wikipedia, the free encyclopedia
Naenara

DE-Wikipedia under Red Star OS 18 11 2019 14 52 11.png

Homepage of the German-language Wikipedia under Naenara
Basic data

developer Korea Computer Center
Publishing year 2002
Current  version at least 3.5
operating system Red Star OS
German speaking No
QS IT
This article was due to content flaws on the quality assurance side of the computer science editorial added. This is done in order to bring the quality of the articles from the subject area of ​​computer science to an acceptable level. Help to eliminate the shortcomings in this article and take part in the discussion !  ( + )

Naenara ( Kor. 내 나라, German: 'My Country') is a web browser from the North Korean IT research institute Korea Computer Center for the Kwangmyong intranet .

The web browser Mozilla Firefox under the Linux version serves as the basis of Naenara . The Firefox web browser was adapted to the North Korean conditions by the Korea Computer Center. The browser was first distributed via the Linux distribution Red Star OS . However , this browser can also be used on tablets .

General functions

Naenara under the Red Star Os 2.0

The browser has a feature on the intranet Kwangmyong to operate, Kwangmyong based on its own Class A network. Depending on the version, the browser can also work outside of North Korea in a normal DNS environment. The browser supports the Korean and English languages.

Many websites do not have a domain entry, so the website can be accessed directly via the IP address of the server . The IP address and the homepage is http://10.76.1.11/. The search engine and other functions are also directed through this domain.

The tablet version can only communicate with Kwangmyong via a VPN connection .

Technical functions

The browser has specific functions that are adapted for use in North Korea.

Anti-phishing and anti-malware lists are supported. The Google programming interface (API) is used here. However, the list is downloaded from the domain instead of the Google domain. This leads to the thesis that the lists come directly from Google and work as a proxy . Another thesis is that the lists for censorship will be modified. 10.76.1.1110.76.1.11

It is also noticeable that the Naenara search engine has the same API as Google. It is speculated that the domain's server is 10.76.1.11acting as a proxy to Google.

IP port 5353 is used as the port for the Multicast Domain Name System ( mDNS ) . Outside of North Korea, the port is used for small local networks.

The browser can be updated via automatic updates. The update function cannot be switched off.

If the browser cannot find a website, it replaces the domain suffix with .com.

Vulnerabilities

Reading the data traffic is easily possible via a " man-in-the-middle attack ".

Another vulnerability was found in 2016 by the security company Hacker House. Commands can be executed on the Red Star OS system through a specially prepared link . Probably a problem arises when processing URIs , in which functions such as Mailto or cal are executed without cleaning up unwanted code fragments from the passed parameters.

Individual evidence

  1. ^ A b Sara Weber: This is how North Korea's state operating system works. Retrieved May 1, 2020 .
  2. a b c d e Red Star tried: The Linux from North Korea - Golem.de. Accessed April 30, 2020 (German).
  3. Will Scott: Will Scott: Computer Science in the DPRK. In: YouTube. media.ccc.de, accessed April 30, 2020 (English).
  4. Florian Grunow, Niklaus Schiess, Manuel Lubetzki: Woolim - Lifting the Fog on DPRK's Latest Tablet PC (33c3). In: YouTube. media.ccc.de, December 29, 2014, accessed on April 30, 2020 (English).
  5. Martyn Williams: Exclusive: North Korea's "Samjiyon" (삼지연) Android tablet. In: YouTube. Martyn Williams, accessed April 30, 2020 .
  6. ^ Martyn Williams: North Korea develops a tablet PC. In: YouTube. Martyn Williams, accessed April 30, 2019 (kor).
  7. a b Firewall settings block DNS - Red Star tried: The Linux from North Korea - Golem.de. Accessed April 30, 2020 (German).
  8. a b c d e North Korea's Naenara Web Browser: It's Weirder Than We Thought. Retrieved April 30, 2020 (American English).
  9. Nadja Ayoub: Tablet from North Korea: This is how communism surfs. Accessed April 30, 2020 .
  10. a b c d Thomas Brewster: Attacking 'Red Star': Leaks Show Just How Easy It Might Be To Hack North Korea. Retrieved May 1, 2020 .
  11. a b DER SPIEGEL: Naenara Browser: How to Surf in North Korea - DER SPIEGEL - Netzwelt. Accessed April 30, 2020 .
  12. Security hole in North Korea's state Linux - Golem.de. Accessed April 30, 2020 (German).