• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Embedded TLS 1.2 Implementation for Smart Metering & Smart Grid Applications

    2015-07-14 01:20:44AttaKofiNsiahAxelSikoraAndreasWalzandArtemYushev

    Atta Kofi Nsiah, Axel Sikora, Andreas Walz, and Artem Yushev

    1. Introduction

    The distribution and metering of energy is a domain which is expected to benefit significantly from the adoption of Internet-of-Things technology. It will accommodate the requirements imposed by a decentralized energy production but also bear the potential to increase the overall efficiency and the comfort for customers.

    Naturally, the remote accessibility of sensitive data and controls in these systems poses a severe security threat and appropriate countermeasures need to be applied. One integral part of this is the mean to transfer data between involved parties and devices securely, i.e. in an authenticated, encrypted, and integrity-checked way. The transport layer security (TLS) protocol is a mature and well standardized solution to this problem[1]. However,deploying TLS and respective cryptographic operations in resource constrained systems like smart meters is a non-trivial task and requires dedicated efforts.

    Currently, we are developing emBetterSSL, a TLS implementation that is addressing the specific challenges in embedded communication systems. Smart grid and smart metering systems constitute a prime example for its targeted applications.

    This paper provides an introduction to emBetterSSL in the context of smart metering applications. It is structured as follows: Section 2 provides a brief overview of smart metering and smart grid applications as well as security requirements related to them. The TLS protocol is outlined in Section 3. Sections 4 and 5 present our TLS implementation and our test setup, respectively.Measurement results and performance characteristics of emBetterSSL are given in Section 6. Section 7 presents related work. Finally, Section 8 summarizes the paper and provides an outlook to future work.

    2. Smart Grid Applications and Related Security Requirements

    Smart grid systems represent a very large and distributed network of intelligent end nodes that are closely linked to energy distribution and metering[2]. In addition to a communication network of high complexity, these systems comprise a variety of different stakeholders. This comes with both an incentive and the potential for cyber attacks on these systems. Some conceivable threats include the manipulation of billing information to obtain free energy, taking unauthorized control of individual electrical units or global load distribution instruments, or compromising a customer’s privacy. An adequate security architecture must therefore ensure that control can only be taken by authorized entities and sensitive data is authentic and confidential.

    A smart metering system is currently in commissioning phase in Germany and can act as an instructive show case for these kinds of systems.

    2.1 Smart Metering in Germany

    The architecture of the smart metering system in Germany is depicted in Fig. 1. Its central communication unit installed on the customers’ premises is the smart meter gateway (SMGW). It is acting as a communication and data processing agent bridging between the wide area network(WAN), the local metrological network (LMN), and the home area network (HAN).

    Fig. 1. Architecture of smart metering system in Germany(adopted from [3]).

    For a safe and secure operation of smart metering systems, the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, BSI) has developed and published a protection profile[3]and a set of technical directives[4],[5]which define obligatory requirements for these systems.Among others, an integral requisite is the use of the TLS protocol in its current version 1.2 for wide areas and in some configurations for local (on-site) communications.For asymmetric cryptography algorithms based on elliptic curves need to be used, while for symmetric encryption the AES algorithm is mandated. Furthermore, the maximum lifetime of TLS sessions is restricted

    Towards the WAN, the SMGW is acting as a TLS client and as a TLS server for meters in the LMN. Thus, a full-featured smart meter gateway needs to implement both the TLS server and TLS client functionalities.

    3. Transport Layer Security (TLS)

    The TLS protocol is able to provide a secure tunnel for confidential, authenticated, and integrity-checked data transfer. It has to be operated over a reliable, though potentially insecure, and connection-oriented communication channel. TLS itself is connection-oriented and follows a client/server model with well-defined roles.Taking advantage of a public key infrastructure (PKI), the secure connection can be established without the need for the communicating parties to share cryptographic secrets in advance. Datagram TLS (DTLS) is a variant of TLS suitable for unreliable transport protocols[6].

    TLS has been subject to several revisions in the past,some of them were triggered by the discovery of vulnerabilities and potential attacks of varying exploitability[7]. To the best of our knowledge, TLS 1.2 can be considered secure unless legacy cryptographic primitives or configurations are used.

    3.1 Structure of TLS

    TLS is composed of five sub-protocols (see Fig. 2). The record protocol performs the fragmentation of messages as well as bulk data encryption/decryption and computation/verification of message authentication codes (MACs).Stacked on top of the record protocol are the handshake protocol, the change cipher specification protocol, the alert protocol, and the application data protocol. The first two are responsible for establishing and negotiating a TLS connection. The alert protocol delivers error messages and the application data protocol is used to transfer raw application-layer data.

    TLS uses the concept of cipher suites to bundle cryptographic primitives to expedient combinations. Each cipher suite specifies a symmetric cipher for bulk data encryption (including the key size), an algorithm for the computation and verification of MACs, and a key exchange algorithm (including authentication).

    Fig. 2. Overview and interrelation of the components of TLS.

    3.2 Connection Establishment

    Any TLS connection is commenced by a handshake which constitutes the most important and computationally most expensive phase. It is triggered by the client and initiated by the exchange of two “Hello” messages between the client and the server. These messages facilitate the negotiation of protocol parameters and the exchange of cryptographic nonces to prevent replay attacks.Authentication of the communication partners and the establishment of shared secrets are achieved by the exchange of dedicated certificate and key exchange messages. Finally, finish messages complete the handshake.

    A full TLS handshake involves asymmetric cryptographic operations to authenticate the communication partners and to generate a shared master secret among them.Depending on the configuration and the type of PKI in place, different cryptographic algorithms such as RSA,Diffie-Hellman (DH), DH with ephemeral keys (DHE), or the digital signature algorithm (DSA) may be used. For DHE and DSA, also variants based on elliptic curve cryptography (ECC), called ECDH, ECDHE, and ECDSA,are specified. Each algorithm and its variants have specific performance and security characteristics with potentially different load impositions for the client and server[8].

    TLS features the possibility to reuse a master secret from a previous connection between the same communication partners. Running this abbreviated handshake skips most cryptographic operations and significantly speeds up the process. The security of the new connection is preserved as long as the master secret has been kept undisclosed. This feature is of particular value in resource constrained systems regularly requiring short-time connections between the same devices.

    3.3 Bulk Data Transmission

    After the authenticity of the communication partners has been verified and the master secret has been established,application data can be encrypted/decrypted using a symmetric cipher and integrity-checked by adding/verifying MACs based on the keyed-hash MAC (HMAC)construction. For this, data is fragmented into TLS records of not more than 16 kilobytes application data and one MAC per record. If application data and MAC don’t make up an integer multiple of the cipher’s block size, at most 255 padding bytes are added, where the actual number is chosen on a random basis to obfuscate the true message length.

    4. TLS Implementations for Embedded Communications

    EmBetterSSL is a TLS implementation developed and maintained by the authors’ team. It is fully written in ANSIC and optimized for the use in small embedded microcontrollers. In addition to its modular architecture, its high efficiency on smaller microcontrollers, and its excellent portability, the use of an abstract interface to the provider of cryptographic services is one of its advantages.

    Its main components are the implementation of the TLS protocol itself, a well-defined interface to a cryptography engine, and a certificate manager in charge of managing and validating certificates.

    EmBetterSSL’s modular architecture allows switching easily between a software-only cryptography engine and a hardware-supported cryptography. For the current implementation, the LibTomCrypt[9]software library is used. Currently, work is ongoing to integrate support for a VaultIC from Inside Secure[10]and a hardware-based security module which kindly has been provided for testing purposes by Inside Secure. It allows outsourcing computationally expensive cryptographic operations from the main CPU to dedicated hardware and additionally features a safe key storage.

    The key exchange algorithms supported by the current version of emBetterSSL are RSA and DHE, while for signatures of certificates, RSA is available.

    The security of emBetterSSL has been evaluated using a comprehensive test suite composed of positive as well as negative test cases. In addition, we used the vulnerability assessment system OpenVAS[11]to ensure emBetterSSL is not affected by flaws known from other TLS implementations. Furthermore, we are working on an approach for pseudo-randomized protocol testing that is going to be applied to emBetterSSL in the near future.

    5. Test Setup

    The objective of our test setup is to provide a platform facilitating functional tests, the validation of security features, the analysis of software and hardware requirements, and finally the performance profiling of emBetterSSL.

    The test setup consists of a Linux PC, an embedded platform hosting emBetterSSL, and the network equipment for Ethernet/TCP/IP-based communication between the former two. An overview of the setup is given in Fig. 3.

    Fig. 3. Test setup for TLS implementation.

    5.1 Embedded Platform

    An STM32F4 Discovery Board is used as an embedded platform running the TLS implementation under test. Its MCU, an STM32F407, is clocked with 168 MHz. An Arduino Ethernet Shield based on the Wiznet W5100 chip is wired via SPI to the MCU to provide TCP/IP connectivity.Two UART-based serial channels between the embedded platform and the PC are used to control the system and to read timing information, respectively.

    Timing information is obtained by means of a lightweight mechanism to record time stamps in relevant places of the execution path of the TLS implementation. It is based on an internal counter of the MCU and offers a time resolution of 10 μs. The uncertainty is thus correlated with the onboard clock source and is assumed to be small enough to be neglected.

    For both server and client roles, the software running on the embedded system implements a loop-back functionality which is echoing any application data received via a TLS connection. For source code compilation “arm-none-eabi” toolchain version 4.8.4 is used with code size optimization.

    5.2 Linux PC Environment

    A standard office PC running Linux is used as a control and analysis platform. In addition to the two serial channels,it is connected to the embedded platform via a local Ethernet interface for network communication.

    A Python-based tool is used to configure the parameters of emBetterSSL via the first serial interface, while a second Python-based tool is decoding the timing information read via the second serial interface. OpenSSL 1.0.1k in either server or client mode is acting as the counterpart for our TLS implementation under test and is invoked from a Python script. Finally, a super-ordinate macro is automatically calling the aforementioned tools to run the complete test suite.

    6. Performance of Embedded TLS

    Our test setup allows profiling the timing characteristics of our TLS implementation with high accuracy and—with respect to a breakdown of operations performed—with high granularity.

    6.1 Test Cases and Performance Figures

    The test configurations used and presented here have been chosen to comply with the requirements for smart metering systems in Germany as briefly outlined in Section 2 as much as possible. However, as previously indicated,ECC is still to be integrated in emBetterSSL, and thus an alternative setting has been used.

    In order to evaluate emBetterSSL in view of use cases typical for smart metering systems and to provide a complete picture, the following performance figures have been derived: Time for booting, i.e. initialization of libraries and context data, time for establishing a new TLS connection with and without session resumption, time for handling a single block of application data (16 bytes), i.e.encryption/decryption and MAC computation/verification,and the average data transfer rate.

    During the boot phase, the system is reading and initializing certificates from the certificate store as well as generating ephemeral key materials to be used in DHE-based key agreement algorithms. The boot or reboot of a system is assumed to be a rare event in smart metering systems.

    Setting up a TLS connection from scratch involves executing a full TLS handshake including authentication and key exchange. It is expected to happen frequently in the context of smart metering, though many connections might reuse key materials from previous sessions. However,session resumption instead of another execution of the complete handshake is legally permitted only under certain circumstances[5].

    The amount of data transmitted per connection is generally expected to be small, or even very small in the LMN. Thus, the time needed for handling the smallest possible amount of application data (block size of the AES block cipher) is measured together with the average data transfer rate derived from the transmission of 1024 bytes of application data within a single TLS record.

    The following parameters have been selected and are fixed for all measurements:

    · TLS protocol version 1.2;

    · Certificate-based authentication of both client and server using RSA-based keys and signatures with the client’s and the server’s certificates;

    · TLS key exchange using the DHE_RSA scheme with a DHE key size of 192 bytes;

    · AES in CBC block cipher mode;

    · SHA256 as a MAC algorithm.

    Table 1: Arrangement of channels

    Furthermore, the following parameters have been varied and measurements have been performed for different combinations (the complete test suite is summarized in Table 1):

    · Size of public keys and signatures in X.509 certificates(RSA_SHA256): 1024 bit and 2048 bit;

    · Negotiated TLS cypher suites: DHE_RSA_AES128_CBC_SHA256 and DHE_RSA_AES256_CBC_SHA256;

    · Handshake types: Full handshake and session resumption.

    It should be noted that in order to minimize the influence of OpenSSL and network communications, the numbers in the following section are derived from accumulated durations of operations performed by emBetterSSL and explicitly exclude time periods where emBetterSSL is in a waiting state. That is, the numbers do not necessarily resemble the absolute latencies and transmission rates observed by a user.

    Furthermore, unless otherwise noted measured quantities from multiple repetitions of the same measurement exhibit a negligible variance and thus only the averaged result without standard deviation will be given in the following. The exception to this is the time for the encryption and decryption of small messages where the non-deterministic addition of padding bytes results in significantly varying timings.

    6.2 Measurement Results

    The system requires approximately 4.4 s for booting.Performing an initial handshake to establish a new TLS connection requires slightly less than 2 s and slightly more than 3.5 s processing time on the embedded system using 1024 bit and 2048 bit RSA keys, respectively. As expected,these numbers are independent of the key size of the symmetric cipher as well as whether emBetterSSL acts as a client or as a server. As seen in Fig. 4, the MCU spends a significant amount of time to compute the shared DH secret.The remaining time is mainly used for the authentication procedure, i.e. the verification of certificates and respective signatures.

    Fig. 4. Comparison of processing costs for a TLS handshake in MCU cycles. For TC01, TC03, and TC09 emBetterSSL is acting as a server, whereas for TC02 and TC10 it is acting as a client.TC03 is using session resumption and the corresponding result is shown scaled by a factor of ten for the sake of visibility.

    Fig. 5. Comparison of processing costs of 16 bytes of application data in MCU cycles. TC01 and TC04 have been measured using a message size of 16 bytes, whereas TC07 and TC08 give the amortized costs of processing 16 bytes determined using a message size of 1024 bytes.

    Session resumption is independent of the previous authentication and key exchange scheme and takes slightly less than 20 ms. Again, this number is independent of the key size of the symmetric cipher and emBetterSSL’s role.

    After a TLS connection has been set up, processing 16 bytes of application data (Fig. 5) for transmission or reception over the TLS tunnel (encryption/ decryption and computation or verification of the MAC) takes on average less than 0.8 ms and 0.07 ms for 16 bytes and 1024 bytes of data, respectively. The distinctive dependence on the message size is due to a large constant contribution whose effect is amortized for long messages. The difference between using AES with 128 bit or 256 bit keys is less than 10%. Detailed numbers are presented in Table 2.

    Table 2: Performance results

    On the embedded systems, a variation of the encryption time across multiple runs of the same measurement is observed which is not present for decryption (indicated as standard deviation σ in Table 2). The reason is the variable padding length which contributes a significant portion of the total data length for short messages. Interestingly, in contrast to our TLS implementation, OpenSSL seems to use the shortest possible padding in any case resulting in a negligible variation for decryption.

    7. Related Work

    Reference [12] presented a DTLS-based security architecture for embedded devices and found a handshake performance of the same order as our results. However, e most related work focused on absolute timing, in contrast to our measurements. Reference [8] evaluated the TLS handshake performance in embedded devices using relative timing and bandwidth metrics.

    8. Summary and Outlook

    We presented the performance results of the TLS implementation specifically optimized for use in deeply embedded systems, as they can be used in smart grid and smart metering applications.

    For an initial handshake we found a processing time on the embedded system between 2 s and 3.5 s, depending on the key size used for authentication.

    Resuming a previous session takes less than 20 ms and thus it constitutes a considerable speed-up of the handshake process. Our results clearly indicate that the bottleneck for those systems, which transmit only small amounts of data per connection, is the initial handshake. Processing time for application data does not seem to play a critical role and doubling the AES key size degrades the performance by less than 10%. The analysis shows that, if carefully implemented and configured, the deployment of TLS in resource-constrained smart metering systems is well possible with acceptable overhead.

    Currently, our work is ongoing to implement support for key exchange and signature algorithms based on ECC and to integrate cryptographic hardware support into emBetterSSL. New features will be used to update our measurements accordingly in the near future. Furthermore,we are working on a framework enabling pseudo-random testing of the implementation’s robustness against adversarial input.

    [1] The Transport Layer Security (TLS) Protocol Version 1.2,RFC5246, The Internet Engineering Task Force, 2008.

    [2] E. D. Knapp and J. T. Langill, Industrial Network Security:Securing Critical Infrastructure Networks for Smart Grid,SCADA, and Other Industrial Control Systems, Syngress,2014.

    [3] BSI TR-03109 Protection Profile for the Gateway of a Smart Metering System (Smart Meter Gateway PP), Bundesamt für Sicherheit in der Informationstechnik, 2014.

    [4] BSI TR-03109 Technische Vorgaben für intelligente Messsysteme und deren sicherer Betrieb, Bundesamt für Sicherheit in der Informationstechnik, 2013.

    [5] TR-03116-3 Kryptographische Vorgaben für Projekte der Bundesregierung, Bundesamt für Sicherheit in der Informationstechnik, 2015.

    [6] Datagram Transport Layer Security Version 1.2, RFC6347,The Internet Engineering Task Force, 2012.

    [7] C. Meyer and J. Schwenk. Lessons learned from previous SSL/TLS Attacks—A brief chronology of attacks and weaknesses. [Online]. Available: http://eprint.iacr.org/2013/049.pdf

    [8] M. Koschuch, M. Hudler, and M. Kruger, “The price of security: A detailed comparison of the TLS handshake performance on embedded devices when using elliptic curve cryptography and RSA,” in Proc. of E-Business and Telecommunications, Springer, 2012, pp. 71-83.

    [9] Cryptographic Software Library “LibTomCrypt”. [Online].Available: http://github.com/libtom/libtomcrypt

    [10] Inside Secure, Hardware-Based Security Module“VaulticIC”, [Online]. Available: http://www.insidesecure.com/Products-Technologies/Secure-Solutions

    [11] OpenVAS: Open Vulnerability Assessment System. [Online].Available: http://www.openvas.org/index.de.html

    [12] T. Kothmayr, C. Schmitt, W. Hu, M. Brunig, and G. Carle,“A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication,” in Proc. of the 37th Annual IEEE Conf. on Local Computer Networks,2012, pp. 956-963.

    偷拍熟女少妇极品色| 亚洲乱码一区二区免费版| 最近手机中文字幕大全| 久久久久久久亚洲中文字幕| 99久国产av精品国产电影| 久久热精品热| 国产精品国产高清国产av| 成人二区视频| 激情 狠狠 欧美| 亚洲欧美精品自产自拍| 国产精品野战在线观看| 99热6这里只有精品| 国产一区二区亚洲精品在线观看| 神马国产精品三级电影在线观看| 真实男女啪啪啪动态图| 国产精品美女特级片免费视频播放器| 男女边吃奶边做爰视频| av播播在线观看一区| 国产高清不卡午夜福利| 久久人妻av系列| 狠狠狠狠99中文字幕| 男女下面进入的视频免费午夜| 岛国毛片在线播放| 精品国内亚洲2022精品成人| a级毛色黄片| 久久午夜福利片| АⅤ资源中文在线天堂| 国内少妇人妻偷人精品xxx网站| 亚洲精华国产精华液的使用体验| 久久久久久久国产电影| 久久精品久久精品一区二区三区| 五月玫瑰六月丁香| eeuss影院久久| 免费观看a级毛片全部| 亚洲精品乱码久久久久久按摩| 插逼视频在线观看| 欧美3d第一页| 欧美成人一区二区免费高清观看| 精品免费久久久久久久清纯| 嫩草影院入口| 欧美成人一区二区免费高清观看| 久久热精品热| 波多野结衣高清无吗| 22中文网久久字幕| 国产爱豆传媒在线观看| 91久久精品电影网| 精品人妻偷拍中文字幕| 午夜福利在线在线| 欧美日本亚洲视频在线播放| 亚洲精品日韩av片在线观看| 日韩av不卡免费在线播放| 又粗又爽又猛毛片免费看| 亚洲欧美精品自产自拍| 美女脱内裤让男人舔精品视频| 九草在线视频观看| 亚洲国产日韩欧美精品在线观看| 99热精品在线国产| 乱人视频在线观看| 亚洲自偷自拍三级| 精品久久久久久电影网 | 黑人高潮一二区| 成人国产麻豆网| 久久久久久久久大av| 99久久中文字幕三级久久日本| 日韩大片免费观看网站 | 激情 狠狠 欧美| 变态另类丝袜制服| 最近最新中文字幕免费大全7| 九九久久精品国产亚洲av麻豆| 久久久久久伊人网av| 精品久久久久久久久亚洲| 久久99热这里只有精品18| 国产精品一及| 亚洲av成人精品一二三区| 色吧在线观看| 国产精品av视频在线免费观看| av免费在线看不卡| 亚洲美女视频黄频| 国产成人91sexporn| av免费在线看不卡| 爱豆传媒免费全集在线观看| АⅤ资源中文在线天堂| 久久精品综合一区二区三区| 国产黄片视频在线免费观看| 亚洲av电影在线观看一区二区三区 | 亚洲精品乱久久久久久| 最新中文字幕久久久久| 亚洲av成人精品一二三区| 久久久久久久久久黄片| 色吧在线观看| 有码 亚洲区| 青春草亚洲视频在线观看| 搡老妇女老女人老熟妇| 我要搜黄色片| 一区二区三区乱码不卡18| 美女高潮的动态| 欧美成人免费av一区二区三区| 日韩欧美国产在线观看| 国产一区有黄有色的免费视频 | 美女内射精品一级片tv| 国产亚洲精品久久久com| 国产美女午夜福利| 亚洲精品456在线播放app| 别揉我奶头 嗯啊视频| 欧美潮喷喷水| 精品少妇黑人巨大在线播放 | 校园人妻丝袜中文字幕| 最近手机中文字幕大全| 干丝袜人妻中文字幕| 亚洲国产成人一精品久久久| 久久人妻av系列| 美女被艹到高潮喷水动态| 黄色欧美视频在线观看| 中文字幕av在线有码专区| 久久久久国产网址| 你懂的网址亚洲精品在线观看 | 久久久国产成人免费| 美女高潮的动态| 精品久久久久久久久久久久久| 91精品一卡2卡3卡4卡| 看免费成人av毛片| 在线天堂最新版资源| 日韩欧美精品v在线| 国产成人免费观看mmmm| 亚洲欧美成人综合另类久久久 | 久久精品国产鲁丝片午夜精品| 欧美潮喷喷水| 国产在线男女| 免费无遮挡裸体视频| .国产精品久久| 成人毛片60女人毛片免费| 国产精品福利在线免费观看| 亚洲一级一片aⅴ在线观看| 久久久久久大精品| 亚洲欧美日韩卡通动漫| 在现免费观看毛片| 三级国产精品片| 亚洲国产精品国产精品| 午夜精品一区二区三区免费看| 国产免费男女视频| 欧美区成人在线视频| 中文天堂在线官网| 亚洲av成人精品一二三区| 精品久久国产蜜桃| 搡老妇女老女人老熟妇| 精品欧美国产一区二区三| 嘟嘟电影网在线观看| 女人被狂操c到高潮| av线在线观看网站| 秋霞伦理黄片| 国产精品.久久久| 久久99精品国语久久久| 精品久久久久久电影网 | 啦啦啦观看免费观看视频高清| 看十八女毛片水多多多| 国产淫片久久久久久久久| 国产精品嫩草影院av在线观看| 秋霞在线观看毛片| 十八禁国产超污无遮挡网站| 国产精品不卡视频一区二区| 夜夜看夜夜爽夜夜摸| 亚洲乱码一区二区免费版| 日韩欧美三级三区| 亚洲高清免费不卡视频| 免费看av在线观看网站| 天堂av国产一区二区熟女人妻| 1000部很黄的大片| 久久99热这里只有精品18| 女人十人毛片免费观看3o分钟| 亚洲国产色片| 又黄又爽又刺激的免费视频.| 欧美人与善性xxx| 日本免费一区二区三区高清不卡| 久久久久精品久久久久真实原创| 床上黄色一级片| 国产成人a∨麻豆精品| 国产精品永久免费网站| 亚洲在久久综合| 免费看a级黄色片| 99久久精品热视频| 91久久精品国产一区二区成人| 亚洲欧美一区二区三区国产| 国产在视频线在精品| 国内精品一区二区在线观看| 男女啪啪激烈高潮av片| 亚洲美女视频黄频| 久久综合国产亚洲精品| 国产美女午夜福利| 国产精品麻豆人妻色哟哟久久 | 久久久久久久久久成人| 久久欧美精品欧美久久欧美| 在线免费观看的www视频| 亚洲国产最新在线播放| 在线播放国产精品三级| 精品少妇黑人巨大在线播放 | 亚洲欧美中文字幕日韩二区| 日本一本二区三区精品| 一个人看视频在线观看www免费| 22中文网久久字幕| av免费在线看不卡| 嫩草影院入口| 99久久成人亚洲精品观看| 日本熟妇午夜| 日日啪夜夜撸| 97在线视频观看| 麻豆av噜噜一区二区三区| 中文字幕av在线有码专区| 熟女电影av网| 2022亚洲国产成人精品| 99久久精品热视频| 亚洲av电影在线观看一区二区三区 | 欧美高清性xxxxhd video| 久久鲁丝午夜福利片| 婷婷色麻豆天堂久久 | 99热这里只有精品一区| 欧美日本视频| 欧美精品一区二区大全| 看非洲黑人一级黄片| 精品久久久久久久久av| 国产私拍福利视频在线观看| 久久草成人影院| 国产成人a区在线观看| 午夜精品一区二区三区免费看| 久久久久精品久久久久真实原创| 亚洲怡红院男人天堂| 青青草视频在线视频观看| 晚上一个人看的免费电影| 久久久久久久久久久免费av| 精品久久久久久久久亚洲| 日本爱情动作片www.在线观看| 婷婷色av中文字幕| 国产午夜精品一二区理论片| 两个人的视频大全免费| 亚洲av福利一区| 一区二区三区乱码不卡18| 国产在线一区二区三区精 | av在线观看视频网站免费| 欧美一区二区国产精品久久精品| 51国产日韩欧美| 中文字幕久久专区| 国产女主播在线喷水免费视频网站 | 日韩国内少妇激情av| 又粗又爽又猛毛片免费看| 九色成人免费人妻av| 狂野欧美白嫩少妇大欣赏| 18+在线观看网站| av免费观看日本| 91在线精品国自产拍蜜月| 91精品国产九色| 国内精品一区二区在线观看| 村上凉子中文字幕在线| 成人特级av手机在线观看| 51国产日韩欧美| 日韩在线高清观看一区二区三区| 神马国产精品三级电影在线观看| 成人特级av手机在线观看| 中文乱码字字幕精品一区二区三区 | 一本久久精品| 欧美一级a爱片免费观看看| 三级国产精品欧美在线观看| 亚洲综合色惰| 国产精华一区二区三区| 一级毛片aaaaaa免费看小| 中文天堂在线官网| 麻豆国产97在线/欧美| 国内精品宾馆在线| 天堂影院成人在线观看| 一个人看视频在线观看www免费| 欧美日本亚洲视频在线播放| 一夜夜www| 亚洲国产精品久久男人天堂| h日本视频在线播放| 亚洲怡红院男人天堂| 成人无遮挡网站| 天堂影院成人在线观看| 你懂的网址亚洲精品在线观看 | 国产av一区在线观看免费| 亚洲丝袜综合中文字幕| 插逼视频在线观看| 精品人妻视频免费看| 日韩欧美三级三区| 99久国产av精品国产电影| 日韩一区二区视频免费看| 我的老师免费观看完整版| 久久人人爽人人爽人人片va| 国产老妇伦熟女老妇高清| 麻豆一二三区av精品| 国产亚洲5aaaaa淫片| 观看美女的网站| 内地一区二区视频在线| 免费av不卡在线播放| 国产精品人妻久久久影院| 国产精品一区www在线观看| 中国美白少妇内射xxxbb| 在线观看一区二区三区| 97热精品久久久久久| 国产综合懂色| 插逼视频在线观看| 欧美精品国产亚洲| 欧美xxxx性猛交bbbb| 久久久久久久久久成人| 精品久久久久久久久亚洲| 亚洲欧美日韩卡通动漫| 国产在线一区二区三区精 | 亚洲一级一片aⅴ在线观看| 麻豆成人午夜福利视频| 午夜视频国产福利| 国产精品福利在线免费观看| 免费观看性生交大片5| 99久久人妻综合| 全区人妻精品视频| 国产高清视频在线观看网站| 少妇人妻精品综合一区二区| 特级一级黄色大片| 国产不卡一卡二| 久久午夜福利片| 可以在线观看毛片的网站| 男人舔奶头视频| 成人漫画全彩无遮挡| 99热6这里只有精品| 久久久久久久久久成人| 亚洲怡红院男人天堂| 春色校园在线视频观看| kizo精华| 久久99热这里只有精品18| 精品一区二区三区视频在线| 久久久久久久久中文| 精品人妻视频免费看| videossex国产| 久久精品熟女亚洲av麻豆精品 | 最近中文字幕2019免费版| АⅤ资源中文在线天堂| 国产精品国产三级国产专区5o | 69av精品久久久久久| 尤物成人国产欧美一区二区三区| 亚洲第一区二区三区不卡| 深爱激情五月婷婷| 国产精品永久免费网站| 永久免费av网站大全| av视频在线观看入口| 老女人水多毛片| 久久热精品热| 天天躁日日操中文字幕| 国产探花在线观看一区二区| 成人三级黄色视频| 亚洲综合精品二区| 青春草视频在线免费观看| 中文欧美无线码| 18禁裸乳无遮挡免费网站照片| 大又大粗又爽又黄少妇毛片口| 中文欧美无线码| 毛片女人毛片| 亚洲av中文字字幕乱码综合| 国产av在哪里看| 亚洲高清免费不卡视频| 中文字幕久久专区| 精品久久久久久久久亚洲| 日本欧美国产在线视频| 国产 一区 欧美 日韩| 日本五十路高清| 亚洲高清免费不卡视频| 成人午夜精彩视频在线观看| 最新中文字幕久久久久| 嫩草影院精品99| 中文字幕精品亚洲无线码一区| 黄色日韩在线| 床上黄色一级片| 99热这里只有精品一区| 国内精品美女久久久久久| 日日干狠狠操夜夜爽| 亚洲国产成人一精品久久久| 免费观看在线日韩| 国产成人福利小说| 亚洲精品456在线播放app| 大话2 男鬼变身卡| 听说在线观看完整版免费高清| 欧美高清性xxxxhd video| 22中文网久久字幕| 少妇猛男粗大的猛烈进出视频 | 少妇的逼好多水| 韩国高清视频一区二区三区| 国产熟女欧美一区二区| 18禁在线播放成人免费| 男女那种视频在线观看| 亚洲成人中文字幕在线播放| 在现免费观看毛片| 国产伦理片在线播放av一区| 国产精品,欧美在线| 国产精品美女特级片免费视频播放器| 女人久久www免费人成看片 | 国产成人a区在线观看| 国语自产精品视频在线第100页| 日韩三级伦理在线观看| 三级国产精品片| 国产一级毛片七仙女欲春2| 搡老妇女老女人老熟妇| 高清在线视频一区二区三区 | 最近中文字幕高清免费大全6| 久久精品国产亚洲av天美| 日韩欧美 国产精品| 欧美激情在线99| 国产探花在线观看一区二区| 少妇人妻一区二区三区视频| 成人av在线播放网站| 成人亚洲欧美一区二区av| 美女内射精品一级片tv| 国产伦精品一区二区三区四那| 在线观看一区二区三区| 日韩 亚洲 欧美在线| 美女脱内裤让男人舔精品视频| 99九九线精品视频在线观看视频| 亚洲av电影不卡..在线观看| 三级国产精品欧美在线观看| 日日干狠狠操夜夜爽| 久久精品熟女亚洲av麻豆精品 | 亚洲国产精品合色在线| 精品久久久久久电影网 | www.av在线官网国产| 热99在线观看视频| 一级二级三级毛片免费看| 国产av一区在线观看免费| 日韩人妻高清精品专区| 少妇猛男粗大的猛烈进出视频 | 岛国在线免费视频观看| 青春草视频在线免费观看| 成人国产麻豆网| 韩国av在线不卡| 全区人妻精品视频| av在线播放精品| 小蜜桃在线观看免费完整版高清| 久久久久久久久大av| 干丝袜人妻中文字幕| 午夜日本视频在线| 亚洲四区av| 99视频精品全部免费 在线| 两个人视频免费观看高清| 97超碰精品成人国产| 国产私拍福利视频在线观看| 亚洲久久久久久中文字幕| 人人妻人人澡欧美一区二区| 日韩高清综合在线| 日本熟妇午夜| 成人特级av手机在线观看| 国产精品麻豆人妻色哟哟久久 | 亚洲美女视频黄频| 成人鲁丝片一二三区免费| 久久精品人妻少妇| 亚洲国产欧美人成| 中文字幕人妻熟人妻熟丝袜美| 免费观看a级毛片全部| 亚洲人与动物交配视频| 精品熟女少妇av免费看| 69人妻影院| 日韩成人伦理影院| 久久久久久久午夜电影| 夜夜爽夜夜爽视频| 欧美bdsm另类| 色视频www国产| 日韩av在线免费看完整版不卡| 日本一二三区视频观看| 亚洲最大成人中文| 偷拍熟女少妇极品色| 少妇的逼水好多| 男人舔女人下体高潮全视频| a级毛色黄片| 日韩一本色道免费dvd| 老司机影院成人| 中文亚洲av片在线观看爽| 婷婷六月久久综合丁香| 欧美一区二区国产精品久久精品| 99久久人妻综合| 精品人妻视频免费看| 午夜激情欧美在线| 日本黄色视频三级网站网址| 69av精品久久久久久| 伦精品一区二区三区| 97在线视频观看| 午夜精品一区二区三区免费看| 亚洲欧洲国产日韩| 国产视频内射| 久久久久久九九精品二区国产| 欧美成人一区二区免费高清观看| 人妻制服诱惑在线中文字幕| 床上黄色一级片| 黄色欧美视频在线观看| 日韩大片免费观看网站 | 日本熟妇午夜| 噜噜噜噜噜久久久久久91| 秋霞伦理黄片| 欧美精品国产亚洲| 十八禁国产超污无遮挡网站| 日本午夜av视频| 桃色一区二区三区在线观看| 亚洲精品自拍成人| 大香蕉97超碰在线| 久久久久久久久久久免费av| 欧美一区二区亚洲| 久久亚洲国产成人精品v| 一级毛片电影观看 | 午夜福利网站1000一区二区三区| 亚洲五月天丁香| 欧美激情国产日韩精品一区| 欧美性猛交╳xxx乱大交人| 国产探花在线观看一区二区| 色吧在线观看| 亚洲精品一区蜜桃| 国产伦精品一区二区三区视频9| 国产精品伦人一区二区| 蜜臀久久99精品久久宅男| 国产麻豆成人av免费视频| av在线蜜桃| 国产亚洲精品久久久com| av.在线天堂| 国模一区二区三区四区视频| 国语自产精品视频在线第100页| 成人午夜高清在线视频| 国产精品不卡视频一区二区| 亚洲精品国产成人久久av| 99久久精品一区二区三区| 日韩三级伦理在线观看| 中文字幕人妻熟人妻熟丝袜美| 久久精品夜夜夜夜夜久久蜜豆| 亚洲精品456在线播放app| 欧美日韩在线观看h| 欧美丝袜亚洲另类| 亚洲电影在线观看av| 一边摸一边抽搐一进一小说| 黄色日韩在线| av卡一久久| 久久久久久久久久久免费av| 两个人视频免费观看高清| 不卡视频在线观看欧美| 一个人免费在线观看电影| 亚洲无线观看免费| 国产亚洲最大av| 中文字幕av在线有码专区| 一级毛片电影观看 | 日韩av在线免费看完整版不卡| 国产人妻一区二区三区在| 免费观看在线日韩| 毛片女人毛片| 国产一级毛片七仙女欲春2| 99久久精品国产国产毛片| 色网站视频免费| 一边摸一边抽搐一进一小说| 一个人看的www免费观看视频| 我的女老师完整版在线观看| 久久久国产成人精品二区| 国产极品天堂在线| 日韩一区二区三区影片| 亚洲欧美精品专区久久| 国产单亲对白刺激| 精华霜和精华液先用哪个| 99久国产av精品| 国产一区二区在线观看日韩| 国产精品伦人一区二区| 五月伊人婷婷丁香| 欧美另类亚洲清纯唯美| 日本wwww免费看| 国产久久久一区二区三区| 亚洲综合色惰| av黄色大香蕉| 亚洲国产欧美在线一区| 亚洲三级黄色毛片| 国产亚洲午夜精品一区二区久久 | 我要看日韩黄色一级片| 亚洲欧美成人精品一区二区| av在线天堂中文字幕| 久久久久久久久久成人| 免费观看性生交大片5| 国内精品一区二区在线观看| 99国产精品一区二区蜜桃av| 日本熟妇午夜| 六月丁香七月| av.在线天堂| 在现免费观看毛片| 亚洲精品乱码久久久久久按摩| 国产精品一二三区在线看| 哪个播放器可以免费观看大片| 国产精品伦人一区二区| 亚洲欧洲国产日韩| 国产大屁股一区二区在线视频| av又黄又爽大尺度在线免费看 | 午夜福利高清视频| 国产亚洲一区二区精品| 少妇被粗大猛烈的视频| av线在线观看网站| 免费不卡的大黄色大毛片视频在线观看 | 卡戴珊不雅视频在线播放| 亚洲经典国产精华液单| 久久99热这里只频精品6学生 | 男女下面进入的视频免费午夜| 久久久久久久国产电影| 国产精品一及| 夜夜爽夜夜爽视频| 色哟哟·www| 欧美高清成人免费视频www| 美女xxoo啪啪120秒动态图| 中国美白少妇内射xxxbb| 午夜亚洲福利在线播放| 亚洲av二区三区四区| 亚洲va在线va天堂va国产| 成人毛片a级毛片在线播放| 午夜激情福利司机影院| 日本五十路高清| 国产美女午夜福利| ponron亚洲| 欧美3d第一页| 日本wwww免费看| 国产日韩欧美在线精品| 一级毛片电影观看 | 97人妻精品一区二区三区麻豆| 亚洲人与动物交配视频| 日本午夜av视频| 日韩欧美国产在线观看|