Technical Structural Details

Database Structure

This section lists the name and purpose of each field in each database table.

Constituents of a Drop-off

Each dropoff (table name "dropoff") contains the following fields, some of which are obvious:

rowID
This is referenced from several other tables and gives the unique number of each complete dropoff.
claimID
The random string given to the user that is used as their key for each dropoff.
claimPasscode
The 2nd random string given to the user, so that the details of the dropoff can be sent by 2 different methods if required for security.
authorizedUser
The username of the dropoff creator.
senderName
The full name of the dropoff creator.
senderEmail
The email address of the dropoff creator. Used to optionally send them an email notification when the dropoff has been picked up.
confirmDelivery
Should an email notification be sent to the creator when a recipient has picked up the dropoff.
senderIP
The IP address used by the dropoff creator. For logging purposes.
created
The timestamp when the dropoff was created.
note
The "short note" optionally attached to the dropoff.

There is a list of all the dropped off files (table name "file") currently in the store.

rowID
Unique row number of each file.
dID
Reference to the rowID in the "dropoff" table.
tmpname
Internal random filename.
basename
Filename as displayed to user.
lengthInBytes
Size of the file.
mimeType
Always application/octet-stream.
description
Short descriptive text for the file added by the dropoff creator.

There is a list of all the pickups made by users (table "pickup"), so they can be shown to the dropoff creators.

dID
Reference to the rowID in the "dropoff" table.
authorizedUser
Username (if available) of the person who picked up the dropoff. Not available if that user did not log in.
emailAddr
Email address of the person who picked up the dropoff.
recipientIP
IP address of the person who picked up the dropoff. Used for logging purposes.
pickupTimestamp
The time when the picked up made.

Every recipient of every dropoff is stored in the table "recipient".

dID
Reference to the rowID in the "dropoff" table.
recipName
The full name of the recipient.
recipEmail
The email address of the recipient.

Sender Address Verification

This is done by giving each verified email address a token which they must pass back to ZendTo to prove they are the owner of the email address they are using. It is created when they have passed the CAPTCHA test and the verification email is about to be sent to them. These tokens expire and are also deleted immediately after use so that playback attacks are not possible.

The authentication tokens are held in the table "authtable".

Auth
Random string generated as the token.
FullName
Full name of the sender who is being verified, so that it can be passed to the "New Dropoff" form.
Email
Email address of the sender who is being verified, so that it can be passed to the "New Dropoff" form.
Organization
Organisation name of the sender who is being verified, so that it can be passed to the "New Dropoff" form.
Expiry
The timestamp when the token expires. Usually set to a few hours after the creation time.

Requests for Dropoffs

When a sender has been requested to dropoff some files, that person circumvents the email address verification and CAPTCHA processes, as they are assumed to be friendly and known to the final recipient of the dropoff.

The token passed to them in the email message is constructed from 3 words, each of which is 3 or 4 letters long. This makes the token very easy to pass by phone if the recipient needs the files urgently and cannot wait for the email to the sender to reach them. The token can be entered by the sender straight into a web form, used to circumvent the address verification and CAPTCHA processes, and also to pre-populate the "New Dropoff" form as far as possible.

The data is stored in the table "reqtable". The tokens expire after a few hours, and are deleted immediately after use so that playback attacks are not possible.

Auth
The 3-word token string.
SrcName
The full name of the sender of the resulting drop-off.
SrcEmail
The email address of the sender of the resulting drop-off.
SrcOrg
The organisation name of the sender of the resulting drop-off.
DestName
The full name of the recipient of the resulting drop-off.
DestEmail
The email address of the recipient of the resulting drop-off. This can be over-ridden by a configuration setting in "preferences.php", which is used to force the dropoffs to be sent to an automatic support ticketing system if required.
Note
The short note accompanying the email message to the drop-off sender and al accompanying the dropoff itself.
Subject
The "Subject:" line of the email message sent to the sender of the resulting drop-off. This is also used in the Subject: line of the drop-off itself, and so can contain a ticket number which, in conjunction with the "DestEmail" over-ride, can be used to force the drop-off to be attached to the worklog of the correct ticket.
Expiry
Timestamp of when the request expires. Usually a few hours after its creation.

Local User Management

One of the available authenticators is "Local" which uses the table "usertable" to store the credentials and name of each user permitted to login to ZendTo. Note that the password itself is not stored, only a 1-way hash of the password that is sufficient to verify the login attempt, but cannot be decrypted back to the user's password.

Management of local users is done using the commands in /opt/zendto/bin.

username
The 1 word username of the user.
password
A 1-way hash of the user's password. It cannot be decrypted back into the user's password, only checked against the hash of the login attempt to verify that the 2 values match.
mail
The full email address of the user.
displayname
The full name of the user.
organization
The organisation name of the user.

Login Attempt Checking

If a user tries to login unsuccessfully too many times in too short a time period, they are locked out completely for a length of time, configurable in "preferences.php". This defeats attempts to use ZendTo to guess users' passwords.

The data is stored in the table "loginlog" and just tracks how many times a user has failed to login consecutively, and what time the first unsuccessful attempt occurred. The records for a user are also deleted as soon as the lockout time has expired, thereby resetting the counter for the user.

username
The username used in the unsuccessful login attempt.
created
The timestamp when the unsuccessful attempt occurred.

Logging

There are 2 primary sources of log information in ZendTo. The first is the web server itself, which will naturally log all pages requested. The second is the ZendTo log, which is usually stored in /var/log/zendto/zendto.log (or /var/zendto/zendto.log on older installations). This log is not automatically rolled, but takes a very long time to become large. It can be rolled at any time, a replacement logfile will automatically be created by ZendTo.

The zendto.log logs all ZendTo operations, and all failures of any action by a user. It is a human-readable text file with a timestamp at the start of each line.

Dropoff Request Keys

The process by which a user is invited to upload a drop-off involves the creation of a string of 3 different words, each of which is 3 or 4 letters. As there are about 3000 such words in English, that gives the number of possible strings as roughly 3000^3 = 27,000,000,000.

The list of potential words is stored in /opt/zendto/lib/wordlist.php and has been checked briefly for rude or offensive words. However, if you find any more, please let me know so that I can remove them from the list! Any particular word will only occur in an average of 1 in every 1,000 requests, so it is not a huge problem.

Security Defences

ZendTo has been built from the ground up with security in mind, so that it is not open to attack on its web interface. Here are some of the measures taken as its defence:

  • Users who cannot login (i.e. users who are not members of the host organisation) can only send files to people who are members of the host organisation. It cannot be used to send files from one non-member to another.
  • All communication via the web can be done encrypted with SSL
  • All authentication traffic between the ZendTo server and its authenticators can be encrypted with SSL
  • If using SQL-based authentication, user passwords are not stored. Instead, a one-way hash of the passwords are stored which is sufficient to authenticate users
  • All usernames entered are checked against a configurable regexp, eliminating LDAP injection attacks
  • All email addresses entered are checked against a regexp, eliminating email routing attacks by methods such as a "%" in an address
  • All values entered in any web form are encoded to handle non-alphabetic characters, eliminating SQL injection and HTML injection attacks
  • All values entered in any web form are checked against configurable regexps, eliminating unknown attacks
  • Being written in PHP, the vast majority of buffer over-run attacks are eliminated
  • The users' filenames are never used directly in the filestore used to keep all the current files. They are all replaced with random strings, so browsing the filesystem will produce very little useful information to a user who gained access to the filesystem
  • All activity is logged by both ZendTo and the web server
  • All IP addresses involved in a dropoff or pickup are logged and sent to the user, making attack attempts traceable
  • All email messages to users stress clearly that they must only follow the link in the message if they were expecting to receive it, and to ignore it completely if not
  • Unauthenticated users must prove they are a human being and not a computer by passing a CAPTCHA test
  • Unauthenticated users must prove they own the email address they are claiming to use, by having to present an authentication key sent to them by email
  • All authentication tokens may only be used once, eliminating playback attacks
  • All "Request for Dropoff" tokens may only be used once, eliminating playback attacks
  • Repeated failed login attempts in a configurable time period cause that user to be locked out for a configurable time period, eliminating brute force password breaking attacks
  • All uploaded files are scanned for viruses, and the whole drop-off is rejected if any file is found to be infected
  • Failure of the virus scanner causes all drop-offs to be rejected eliminating attacks that attempt to bypass the virus scanner by breaking it