We have an TrueNAS System running TrueNAS-13.0-U5.3. It is bound to Active Directory and used solely for SMB file sharing. Recently there have been periodic event where SMB service quality is degraded - performance decreases and the service stops accepting new connections. Once the SMB service is stopped and restarted, the issue is temporarily resolved.
During these events the /var/log/messages contains messages as indicated below:
Sep 15 11:03:28 FS.example.lan kernel: pid 41336 (smbd), jid 0, uid 0: exited on signal 6 Sep 15 11:03:28 FS.example.lan kernel: pid 42956 (smbd), jid 0, uid 0: exited on signal 6 Sep 15 11:03:28 FS.example.lan kernel: pid 90877 (smbd), jid 0, uid 0: exited on signal 6 Upon inspection of the var/log/samba4/log.smbd there appears to be a flood of authentication attempts by the guest user. For example, in a two hour period today there are approximately 10,000 of these attempts across the 5 shares on this server. Guest access is not permitted on any share.
[2023/09/15 11:22:38.582960, 1] ../../source3/smbd/service.c:399(create_connection_session_info) create_connection_session_info: guest user (from session setup) not permitted to access this share (exampleshare) [2023/09/15 11:22:38.583037, 1] ../../source3/smbd/service.c:588(make_connection_snum) create_connection_session_info failed: NT_STATUS_ACCESS_DENIED [2023/09/15 11:22:38.589570, 1] ../../source3/smbd/service.c:399(create_connection_session_info) create_connection_session_info: guest user (from session setup) not permitted to access this share (exampleshare) There are approximately 300 client computers on the network, mixed macOS, Windows, Linux.
My questions are:
- What if any method is there to determine the source IP or hostname of the device from which the guest authentication request is originating?
- Is there any normal activity that could account for these observations?