はじめに

最近知ったコマンドだが、大切そうなので調べたことをメモ。 ホストのsocketに関する情報を取得するコマンドらしい。

ssの名前の由来: socket statistics

ssコマンドをオプションなしで実行すると、ESTABLISHED状態のソケットを表示する。

ss コマンド チートシート

基本構文

ss [オプション]

オプションなしの場合、

一般的なオプション

オプション 説明
-t TCP ソケットのみ表示
-u UDP ソケットのみ表示
-l LISTEN 状態のソケットのみ表示
-a すべてのソケットを表示
-p プロセス情報を表示
-n 数値表記(ホスト名解決をしない)
-r ホスト名を解決して表示
-s ソケットの統計情報を表示

よく使うコマンド

すべてのソケットを表示

ss -a

TCP のみを表示

ss -t

UDP のみを表示

ss -u

LISTEN しているポートを確認

ss -tuln

接続中の TCP ソケットを表示

ss -t

LISTEN しているプロセスを表示

ss -tlp

ポート 80 で LISTEN しているプロセスを確認

ss -tlp | grep :80

プロセス ID(PID)付きでソケット情報を取得

ss -tap

統計情報を表示

ss -s

特定のポートを使用しているソケットを表示(例: 443)

ss -at | grep :443

フィルタリングオプション

オプション 説明
-4 IPv4 のみ表示
-6 IPv6 のみ表示
state ESTABLISHED 確立された接続のみ表示
state LISTEN LISTEN 状態の接続のみ表示
src <IP> 指定した送信元 IP の接続を表示
dst <IP> 指定した宛先 IP の接続を表示

高度な使用例

すべての TCP ソケットの詳細を表示

ss -tpla

すべての UDP ソケットの詳細を表示

ss -upla

ある IP からの接続をフィルタリング(例: 192.168.1.1)

ss -at src 192.168.1.1

あるポートへの接続をフィルタリング(例: 22)

ss -at dst :22

プロセス ID(PID)とともにリスニングしているすべてのポートを表示

ss -ltpn

まとめ

  • ssnetstat の代替として推奨される。
  • カーネル空間から直接データを取得するため高速。
  • -tuln で LISTEN 中の TCP/UDP ポートを確認できる。
  • -p でプロセス情報を取得できる。
  • -s でソケットの統計情報を取得できる。

ss コマンドの歴史

1990年代: net-tools の時代 (netstat)

Linux の初期ネットワークツールとして net-tools パッケージが広く使われていた。netstat コマンドが含まれており、ネットワークソケットの状態を確認する手段として普及した。しかし、netstat は古い Berkeley Sockets API に依存しており、カーネルのネットワークスタックの更新に追従しにくくなっていた。

2001年: iproute2 の登場

iproute2 は、Linux のネットワーク管理を改善するために開発された新しいツール群で、ip コマンドを中心に構成されている。これにより、従来の ifconfigroute の代替が進められた。

2004年頃: ss コマンドの追加

Linux の iproute2 パッケージの一部として ss (Socket Statistics) コマンドが追加された。これは netstat の代替として設計され、より高速かつ詳細なソケット情報を提供できるようになった。

  • /proc/net を介さず、直接カーネル空間からデータを取得するため高速。
  • TCP、UDP、RAW ソケットの詳細な統計情報を表示可能。
  • netstat では取得できない詳細なオプションが利用可能。

2010年代: net-tools の非推奨化

net-tools パッケージのメンテナンスが停止し、ほとんどのディストリビューションで iproute2 がデフォルトとなった。その結果、netstat ではなく ss の使用が推奨されるようになった。

現在: ss の標準化

現在では、多くの Linux ディストリビューションで ss コマンドがデフォルトで利用可能となり、netstat に代わる標準ツールとして定着している。

ss コマンドの出力例と解説

1. ss -tuln(LISTEN 状態の TCP/UDP ソケットを表示)

$ ss -tuln
Netid State    Recv-Q Send-Q Local Address:Port  Peer Address:Port  
tcp   LISTEN   0      128    0.0.0.0:22         0.0.0.0:*      
tcp   LISTEN   0      128    127.0.0.1:5432     0.0.0.0:*      
udp   UNCONN   0      0      0.0.0.0:68         0.0.0.0:*      

各カラムの意味

カラム名 説明
Netid ソケットの種類 (tcp, udp, unix など)
State ソケットの状態(LISTEN, ESTABLISHED, CLOSE-WAIT, TIME-WAIT など)
Recv-Q 受信キューのバイト数(未処理データ)
Send-Q 送信キューのバイト数(送信待ちのデータ)
Local Address:Port ローカルのアドレスとポート
Peer Address:Port ピア(リモート)のアドレスとポート(LISTEN の場合 *

ポイント

  • 0.0.0.0:22 → すべてのインターフェースで SSH (22番ポート) を LISTEN
  • 127.0.0.1:5432 → PostgreSQL がローカルホストのみで LISTEN
  • udp UNCONN → UDP ソケットが接続されておらず待機状態

2. ss -tanp(確立された TCP コネクションを表示)

$ ss -tanp
Netid  State      Recv-Q Send-Q Local Address:Port   Peer Address:Port   Process   
tcp    ESTAB      0      0      192.168.1.100:22     192.168.1.200:54321 users:(("sshd",pid=1001,fd=3))
tcp    ESTAB      0      0      192.168.1.100:443    192.168.1.50:60923  users:(("nginx",pid=2054,fd=7))

ポイント

  • ESTAB (ESTABLISHED) 状態のソケットのみ表示
  • Recv-Q/Send-Q0 → 送受信データなし
  • users:(("sshd",pid=1001,fd=3)) → SSHD プロセスがポート 22 を使用
  • nginx がポート 443 で HTTPS 接続を処理

3. ss -s(統計情報を表示)

$ ss -s
Total: 300 (kernel 325)
TCP:   120 (estab 20, closed 90, orphaned 3, synrecv 2, timewait 25/0), ports 50

Transport Total     IP        IPv6
*         325       -         -        
RAW       3         2         1        
UDP       60        50        10       
TCP       120       100       20       
INET      300       250       50       
FRAG      10        8         2        

ポイント

  • TCP の詳細
    • estab 20 → 確立された(ESTABLISHED)TCP 接続数
    • closed 90 → クローズされたソケット数
    • synrecv 2 → SYN-RECEIVED 状態のコネクション数(接続確立途中)
    • timewait 25/0 → TIME-WAIT 状態のコネクション数
  • 各プロトコルのカウント
    • RAW, UDP, TCP のソケット数をカウント

4. ss -at '( dport = 22 )'(特定のポートへの接続を表示)

$ ss -at '( dport = 22 )'
State       Recv-Q Send-Q Local Address:Port  Peer Address:Port  
ESTAB       0      0      192.168.1.100:22    192.168.1.200:54321
ESTAB       0      0      192.168.1.100:22    192.168.1.201:53212

ポイント

  • dport = 22 で、SSH ポート 22 への接続のみをフィルタリング
  • SSH セッションが 2 つ確立 (ESTAB) されていることを示す

まとめ

コマンド 説明
ss -tuln LISTEN している TCP/UDP ポートを確認
ss -tanp 確立された TCP コネクションと関連プロセスを表示
ss -s ソケットの統計情報を表示
ss -at '( dport = 22 )' 特定のポート(例: 22)への接続を表示

ssnetstat より高速で詳細なソケット情報を取得できる。特に、フィルタリング (dport, src, dst など) を活用すると効率的にソケットを調査できる。

man ssより引用

SS(8)                                                        System Manager's Manual                                                        SS(8)

NAME
       ss - another utility to investigate sockets

SYNOPSIS
       ss [options] [ FILTER ]

DESCRIPTION
       ss  is  used  to  dump socket statistics. It allows showing information similar to netstat.  It can display more TCP and state information
       than other tools.

OPTIONS
       When no option is used ss displays a list of open non-listening sockets (e.g. TCP/UNIX/UDP) that have established connection.

       -h, --help
              Show summary of options.

       -V, --version
              Output version information.

       -H, --no-header
              Suppress header line.

       -O, --oneline
              Print each socket's data on a single line.

       -n, --numeric
              Do not try to resolve service names. Show exact bandwidth values, instead of human-readable.

       -r, --resolve
              Try to resolve numeric address/ports.

       -a, --all
              Display both listening and non-listening (for TCP this means established connections) sockets.

       -l, --listening
              Display only listening sockets (these are omitted by default).

       -o, --options
              Show timer information. For TCP protocol, the output format is:

              timer:(<timer_name>,<expire_time>,<retrans>)

              <timer_name>
                     the name of the timer, there are five kind of timer names:

                     on : means one of these timers: TCP retrans timer, TCP early retrans timer and tail loss probe timer

                     keepalive: tcp keep alive timer

                     timewait: timewait stage timer

                     persist: zero window probe timer

                     unknown: none of the above timers

              <expire_time>
                     how long time the timer will expire

              <retrans>
                     how many times the retransmission occurred

       -e, --extended
              Show detailed socket information. The output format is:

              uid:<uid_number> ino:<inode_number> sk:<cookie>

              <uid_number>
                     the user id the socket belongs to

              <inode_number>
                     the socket's inode number in VFS

              <cookie>
                     an uuid of the socket

       -m, --memory
              Show socket memory usage. The output format is:

              skmem:(r<rmem_alloc>,rb<rcv_buf>,t<wmem_alloc>,tb<snd_buf>,
                            f<fwd_alloc>,w<wmem_queued>,o<opt_mem>,
                            bl<back_log>,d<sock_drop>)

              <rmem_alloc>
                     the memory allocated for receiving packet

              <rcv_buf>
                     the total memory can be allocated for receiving packet

              <wmem_alloc>
                     the memory used for sending packet (which has been sent to layer 3)

              <snd_buf>
                     the total memory can be allocated for sending packet

              <fwd_alloc>
                     the memory allocated by the socket as cache, but not used for receiving/sending packet yet. If need memory  to  send/receive
                     packet, the memory in this cache will be used before allocate additional memory.

              <wmem_queued>
                     The memory allocated for sending packet (which has not been sent to layer 3)

              <opt_mem>
                     The memory used for storing socket option, e.g., the key for TCP MD5 signature

              <back_log>
                     The  memory used for the sk backlog queue. On a process context, if the process is receiving packet, and a new packet is re‐
                     ceived, it will be put into the sk backlog queue, so it can be received by the process immediately

              <sock_drop>
                     the number of packets dropped before they are de-multiplexed into the socket

       -p, --processes
              Show process using socket.

       -T, --threads
              Show thread using socket. Implies -p.  -p.

       -i, --info
              Show internal TCP information. Below fields may appear:

              ts     show string "ts" if the timestamp option is set

              sack   show string "sack" if the sack option is set

              ecn    show string "ecn" if the explicit congestion notification option is set

              ecnseen
                     show string "ecnseen" if the saw ecn flag is found in received packets

              fastopen
                     show string "fastopen" if the fastopen option is set

              cong_alg
                     the congestion algorithm name, the default congestion algorithm is "cubic"

              wscale:<snd_wscale>:<rcv_wscale>
                     if window scale option is used, this field shows the send scale factor and receive scale factor

              rto:<icsk_rto>
                     tcp re-transmission timeout value, the unit is millisecond

              backoff:<icsk_backoff>
                     used for exponential backoff re-transmission, the actual re-transmission timeout value is icsk_rto << icsk_backoff

              rtt:<rtt>/<rttvar>
                     rtt is the average round trip time, rttvar is the mean deviation of rtt, their units are millisecond

              ato:<ato>
                     ack timeout, unit is millisecond, used for delay ack mode

              mss:<mss>
                     max segment size

              cwnd:<cwnd>
                     congestion window size

              pmtu:<pmtu>
                     path MTU value

              ssthresh:<ssthresh>
                     tcp congestion window slow start threshold

              bytes_acked:<bytes_acked>
                     bytes acked

              bytes_received:<bytes_received>
                     bytes received

              segs_out:<segs_out>
                     segments sent out

              segs_in:<segs_in>
                     segments received

              send <send_bps>bps
                     egress bps

              lastsnd:<lastsnd>
                     how long time since the last packet sent, the unit is millisecond

              lastrcv:<lastrcv>
                     how long time since the last packet received, the unit is millisecond

              lastack:<lastack>
                     how long time since the last ack received, the unit is millisecond

              pacing_rate <pacing_rate>bps/<max_pacing_rate>bps
                     the pacing rate and max pacing rate

              rcv_space:<rcv_space>
                     a helper variable for TCP internal auto tuning socket receive buffer

              tcp-ulp-mptcp flags:[MmBbJjecv] token:<rem_token(rem_id)/loc_token(loc_id)> seq:<sn> sfseq:<ssn> ssnoff:<off> maplen:<maplen>
                     MPTCP subflow information

       --tos  Show ToS and priority information. Below fields may appear:

              tos    IPv4 Type-of-Service byte

              tclass IPv6 Traffic Class byte

              class_id
                     Class id set by net_cls cgroup. If class is zero this shows priority set by SO_PRIORITY.

       --cgroup
              Show cgroup information. Below fields may appear:

              cgroup Cgroup v2 pathname. This pathname is relative to the mount point of the hierarchy.

       --tipcinfo
              Show internal tipc socket information.

              -K, --kill
                     Attempts to forcibly close sockets. This option displays sockets that are successfully closed  and  silently  skips  sockets
                     that the kernel does not support closing. It supports IPv4 and IPv6 sockets only.

              -s, --summary
                     Print  summary statistics. This option does not parse socket lists obtaining summary from various sources. It is useful when
                     amount of sockets is so huge that parsing /proc/net/tcp is painful.

              -E, --events
                     Continually display sockets as they are destroyed

              -Z, --context
                     As the -p option but also shows process security context. If the -T option is used, also shows thread security context.

                     For netlink(7) sockets the initiating process context is displayed as follows:

                            1.  If valid pid show the process context.

                            2.  If destination is kernel (pid = 0) show kernel initial context.

                            3.  If a unique identifier has been allocated by the kernel or netlink user, show context as "unavailable". This will
                                generally indicate that a process has more than one netlink socket active.

              -z, --contexts
                     As the -Z option but also shows the socket context. The socket context is taken from the associated inode and is not the ac‐
                     tual socket context held by the kernel. Sockets are typically labeled with the context of the creating process, however  the
                     context shown will reflect any policy role, type and/or range transition rules applied, and is therefore a useful reference.

              -N NSNAME, --net=NSNAME
                     Switch to the specified network namespace name.

              -b, --bpf
                     Show socket classic BPF filters (only administrators are allowed to get these information).

              -4, --ipv4
                     Display only IP version 4 sockets (alias for -f inet).

              -6, --ipv6
                     Display only IP version 6 sockets (alias for -f inet6).

              -0, --packet
                     Display PACKET sockets (alias for -f link).

              -t, --tcp
                     Display TCP sockets.

              -u, --udp
                     Display UDP sockets.

              -d, --dccp
                     Display DCCP sockets.

              -w, --raw
                     Display RAW sockets.

              -x, --unix
                     Display Unix domain sockets (alias for -f unix).

              -S, --sctp
                     Display SCTP sockets.

              --tipc Display tipc sockets (alias for -f tipc).

              --vsock
                     Display vsock sockets (alias for -f vsock).

              --xdp  Display XDP sockets (alias for -f xdp).

              -M, --mptcp
                     Display MPTCP sockets.

              --inet-sockopt
                     Display inet socket options.

              -f FAMILY, --family=FAMILY
                     Display  sockets  of  type FAMILY.  Currently the following families are supported: unix, inet, inet6, link, netlink, vsock,
                     tipc, xdp.

              -A QUERY, --query=QUERY, --socket=QUERY
                     List of socket tables to dump, separated by commas. The following identifiers are understood:  all,  inet,  tcp,  udp,  raw,
                     unix,  packet,  netlink,  unix_dgram, unix_stream, unix_seqpacket, packet_raw, packet_dgram, dccp, sctp, tipc, vsock_stream,
                     vsock_dgram, xdp, mptcp. Any item in the list may optionally be prefixed by an exclamation mark (!)  to exclude that  socket
                     table from being dumped.

              -D FILE, --diag=FILE
                     Do  not display anything, just dump raw information about TCP sockets to FILE after applying filters. If FILE is - stdout is
                     used.

              -F FILE, --filter=FILE
                     Read filter information from FILE.  Each line of FILE is interpreted like single command line option. If FILE is - stdin  is
                     used.

              FILTER := [ state STATE-FILTER ] [ EXPRESSION ]
                     Please take a look at the official documentation for details regarding filters.

STATE-FILTER
       STATE-FILTER  allows  one  to construct arbitrary set of states to match. Its syntax is sequence of keywords state and exclude followed by
       identifier of state.

       Available identifiers are:

              All standard TCP states: established, syn-sent, syn-recv, fin-wait-1, fin-wait-2, time-wait, closed, close-wait, last-ack,  listen‐
              ing and closing.

              all - for all the states

              connected - all the states except for listening and closed

              synchronized - all the connected states except for syn-sent

              bucket - states, which are maintained as minisockets, i.e.  time-wait and syn-recv

              big - opposite to bucket

EXPRESSION
       EXPRESSION  allows filtering based on specific criteria.  EXPRESSION consists of a series of predicates combined by boolean operators. The
       possible operators in increasing order of precedence are or (or | or ||), and (or & or &&), and not (or !). If no operator is between con‐
       secutive predicates, an implicit and operator is assumed. Subexpressions can be grouped with "(" and ")".

       The following predicates are supported:

       {dst|src} [=] HOST
              Test if the destination or source matches HOST. See HOST SYNTAX for details.

       {dport|sport} [OP] [FAMILY:]:PORT
              Compare the destination or source port to PORT. OP can be any of "<", "<=", "=", "!=", ">=" and ">".  Following  normal  arithmetic
              rules. FAMILY and PORT are as described in HOST SYNTAX below.

       dev [=|!=] DEVICE
              Match based on the device the connection uses. DEVICE can either be a device name or the index of the interface.

       fwmark [=|!=] MASK
              Matches  based  on  the fwmark value for the connection. This can either be a specific mark value or a mark value followed by a "/"
              and a bitmask of which bits to use in the comparison. For example "fwmark = 0x01/0x03" would match if  the  two  least  significant
              bits of the fwmark were 0x01.

       cgroup [=|!=] PATH
              Match if the connection is part of a cgroup at the given path.

       autobound
              Match if the port or path of the source address was automatically allocated (rather than explicitly specified).

       Most operators have aliases. If no operator is supplied "=" is assumed.  Each of the following groups of operators are all equivalent:

              • = == eq

              • != ne neq

              • > gt

              • < lt

              • >= ge geq

              • <= le leq

              • ! not

              • | || or

              • & && and

HOST SYNTAX
       The general host syntax is [FAMILY:]ADDRESS[:PORT].

       FAMILY  must  be  one  of the families supported by the -f option. If not given it defaults to the family given with the -f option, and if
       that is also missing, will assume either inet or inet6. Note that all host conditions in the expression should either all be the same fam‐
       ily or be only inet and inet6. If there is some other mixture of families, the results will probably be unexpected.

       The form of ADDRESS and PORT depends on the family used. "*" can be used as a wildcard for either the address or  port.  The  details  for
       each family are as follows:

       unix   ADDRESS is a glob pattern (see fnmatch(3)) that will be matched case-insensitively against the unix socket's address. Both path and
              abstract names are supported. Unix addresses do not support a port, and "*" cannot be used as a wildcard.

       link   ADDRESS  is  the case-insensitive name of an Ethernet protocol to match. PORT is either a device name or a device index for the de‐
              sired link device, as seen in the output of ip link.

       netlink
              ADDRESS is a descriptor of the netlink family. Possible values come from /etc/iproute2/nl_protos.  PORT  is  the  port  id  of  the
              socket, which is usually the same as the owning process id. The value "kernel" can be used to represent the kernel (port id of 0).

       vsock  ADDRESS is an integer representing the CID address, and PORT is the port.

       inet and inet6
              ADDRESS is an ip address (either v4 or v6 depending on the family) or a DNS hostname that resolves to an ip address of the required
              version.  An  ipv6  address must be enclosed in "[" and "]" to disambiguate the port separator. The address may additionally have a
              prefix length given in CIDR notation (a slash followed by the prefix length in bits). PORT is either the numerical socket port,  or
              the service name for the port to match.

USAGE EXAMPLES
       ss -t -a
              Display all TCP sockets.

       ss -t -a -Z
              Display all TCP sockets with process SELinux security contexts.

       ss -u -a
              Display all UDP sockets.

       ss -o state established '( dport = :ssh or sport = :ssh )'
              Display all established ssh connections.

       ss -x src /tmp/.X11-unix/*
              Find all local processes connected to X server.

       ss -o state fin-wait-1 '( sport = :http or sport = :https )' dst 193.233.7/24
              List all the tcp sockets in state FIN-WAIT-1 for our apache to network 193.233.7/24 and look at their timers.

       ss -a -A 'all,!tcp'
              List sockets in all states from all socket tables but TCP.

SEE ALSO
       ip(8),
       RFC 793 - https://tools.ietf.org/rfc/rfc793.txt (TCP states)

AUTHOR
       ss was written by Alexey Kuznetsov, <[email protected]>.

       This manual page was written by Michael Prokop <[email protected]> for the Debian project (but may be used by others).

                                                                                                                                            SS(8)