• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning

    2022-08-24 12:58:16ThienPhucDoanandSouhwanJung
    Computers Materials&Continua 2022年7期

    Thien-Phuc Doan and Souhwan Jung

    School of Electronic Engineering, Soongsil University, Seoul, 06978, Korea

    Abstract: Container technology plays an essential role in many Information and Communications Technology (ICT) systems.However, containers face a diversity of threats caused by vulnerable packages within container images.Previous vulnerability scanning solutions for container images are inadequate.These solutions entirely depend on the information extracted from package managers.As a result, packages installed directly from the source code compilation, or packages downloaded from the repository, etc.,are ignored.We introduce DAVS-A Dockerfile analysis-based vulnerability scanning framework for OCI-based container images to deal with the limitations of existing solutions.DAVS performs static analysis using file extraction based on Dockerfile information to obtain the list of Potentially Vulnerable Files (PVFs).The PVFs are then scanned to figure out the vulnerabilities in the target container image.The experimental shows the outperform of DAVS on detecting Common Vulnerabilities and Exposures (CVE) of 10 known vulnerable images compared to Clair- the most popular container image scanning project.Moreover, DAVS found that 68% of real-world container images are vulnerable from different image registries.

    Keywords: Container security; vulnerability scanning; OCI image analysis

    1 Introduction

    Virtualization is applied to many fields in Information and Communication Technology (ICT)systems.In particular, 5G networks use virtualization as a way to optimize hardware capabilities.Traditional VM technology faces a performance problem due to virtualizing numerous components that were not necessary for the system repeatedly (i.e., multiple identical VMs running multiple kernels), which indirectly wastes unnecessary computation resources.In contrast, the container shows better performance [1].By sharing the OS kernel, containers give significantly higher performance than VMs.Docker containers are being considered as a replacement for virtual machines in highperformance systems.

    Container technology has many advantages over VMs, but they are not secure enough.Sultan et al.[2] pointed out four threats models of Container security and a set of protecting solutions,from software-based to hardware-based.Gao et al.argued that several theoretical attack vectors break resource control (cgroup) [3] in the Linux container system.Therefore, developers often need to concentrate on checking for the vulnerability of their product, especially the container image.

    Current vulnerability analysis solutions for Docker containers are inadequate.Scanning tools such as Trivy [4], Clair [5] entirely depend on the information extracted from package managers(e.g., dpkg, apk).Firstly, the scanning solution reads the metadata of the package manager inside the container image (e.g., dpkg metadata file is stored inside/var/lib/dpkg/status).Then, the tool gets the package name as well as the version then compares it with the CVE database to point out the known vulnerabilities.However,applications installed directly from the source code compilation, downloaded from the repository, etc., are left out.Subsequently, vulnerabilities coming from these packages are not detected.In other words, the coverage of current solutions is low.

    We propose DAVS-Dockerfile Analysis for Vulnerable Scanning.DAVS leverages a copious amount of information in the Dockerfile to scrutinize the corresponding container image.This scheme statically analyzes the container image, even without Dockerfile attachment needed, to obtain aPotentially Vulnerable Files (PVFs) list.ThePVFsingress into a Vulnerability Checking module for known CVEs (Common Vulnerabilities and Exposures) detection.This procedure helps DAVS deal with the shortcoming of previous scanning solutions by focusing on in-build-time compiled, downloaded, and added packages that previous vulnerable scanning solutions have not done.Moreover, Clair or Trivy can cooperate with DAVS to increase coverage.

    This paper has the following contributions:

    ?A new scheme for analyzing Dockerfile, which tracks the behavior while constructing a container image, is introduced.This method is helpful to expose the installed packages’name and their version.

    ?This paper proposes DAVS-a framework to statically analyzes Dockerfile to extract Potentially Vulnerable Files (PVFs) that help detect known vulnerabilities (i.e., represented in the form of CVE metadata) in container images more efficiently.

    ?By using DAVS, this work gives a high warning to the community of the risks of using public container images.

    To sum things up, this work proposes a new system to overcome the imperfections of previous container image vulnerability scanning.By pinpointing vulnerabilities in container images, DAVS helps to reduce security risks when deploying applications to the cloud or edge computing system.Although these systems use many different container engines, DAVS is applicable because it supports all OCI-compliant container engines (e.g., Kubernetes uses CRI-O, Docker, contained as its container runtimes).Therefore, DAVS can help to enhance the security of most current container systems.

    This paper is organized as follows: Related works are listed in Section 2 to express the limitation of previous solutions.Section 3 introduces container technology and how to make a container image.Section 4 describes the architecture of DAVS and explains components and algorithms.The authors show how they evaluate DAVS in Section 5 and discuss their proposed framework in the last section.

    2 Related Work

    Docker image security is an essential part of Docker container system security.Docker advises developers and image composers to suppose that their distributed pipeline contains some actively harmful packages [6].Docker provided theNotary frameworkto create a content trust network that can be enabled in a container registry [7].On the other hand, several tools perform the vulnerable checking for container images [8].Some open their source code, such as Clair, Trivy, Anchore [9],Dagda [10].Some provide a premium feature combined with their cloud or Docker Registry service Docker Security in Docker Enterprise.

    These vulnerable scanning might have different techniques or architectures.However, the overall methods are similar.These tools collect vulnerabilities from many sources such as National Vulnerability Database (NVD), Common Vulnerabilities and Exposures (CVE), then store this information into a vulnerable database with the application (or package) name, version, CVE identity and the affected OS.

    These scanners extract the installed packages and dependencies information inside the container image without running the container.They try to get as much detail as possible about the packages and dependencies, such as name and version.Finally, these tools compare with the vulnerable database to generate the final report.Many studies have relied on the

    Many studies have relied on the vulnerability scanning tools mentioned above to assess the security of image containers [11-17].Shu et al.built DIVA-a framework that automatically discovers,downloads and analyzes container images on Docker Hub [2].Their framework relied on the power of Clair to statically identify vulnerabilities.Michael Falk and his partner Oscar Henriksson utilized Outpost24’s scanner to check the top 1000 Docker images [18].Wist et al.downloaded and scanned over 2500 images from Docker Hub using theAnchoreframework [19].Liu et al.extracted any executed programs (e.g., JAR, Shell script) in the container images and scanned them usingVirus totals[20].Their proposal helps detect malicious container images.However, it cannot work for vulnerable detection.In a word, current studies on vulnerability checking on container images primarily leverage popular scanning solutions for their statistical research.Tab.1 shows the characteristics of state-ofthe-art techniques.

    Table1:The comparison of previous vulnerability scanning solutions for container images.Thesymbol×means“not applicable.”

    Previous container image scanning tools extract information from the packages, libraries and software within the image.However, these techniques are highly dependent on the Package manager(e.g.,apt,yum,dkpg).Consequently, packages installed directly through compiling, downloading, or adding executables precisely to the image are ignored.Therefore, an additional solution is needed to extract the required information about the custom applications (i.e., the directly installed packages).

    3 Background

    3.1 Container Technologies

    Docker container is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings[21].Containers are isolated from each other and bundle their software, libraries and configuration files.They can communicate through well-defined channels.Containers require fewer resources than virtual machines since they are shared the same operating system kernel.

    The Open Container Initiative (OCI) has been working since 2015 to standardize a container system’s structures, specifications and workflows.At present, OCI contains two specifications: Runtime specification and Image specification.

    In the Image specification, OCI expresses that the container image has a layered structure.All of the layers are read-only, which means they cannot be modified while using it.Any changes will be compressed and updated as a new layer of the new image’s version (tag).Container images become containers at runtime.Then a read-write layer on top of the other layers will be generated for the operation.This architecture ensures that multiple containers using the same image have no collision.

    3.2 The Making of Docker Container Image

    As shown in Fig.1, a Docker image is made by using two main ways.First, the image is built using Dockerfile.Docker builds images automatically by reading the instructions from a Dockerfile, a text file containing all commands to build a given image.A Dockerfile adheres to a specific format and set of instructions.FROM, COPY and RUNinstructions become three corresponding layers from the bottom up to the top.Each layer has a hash value to distinguish, in case of the same Instruction, but different files, while the building executes, is added into the layers.

    Second, the image is created after the runtime container changes (e.g., installing new packages,adding files, modifying files or directories).All the changes will be concentrated inside a new layer.The new image should have a new name tag as the identification to distinguish from others.

    Figure 1: (Continued)

    Figure 1: Themaking of a container image.(a): Container lifecycle (b) Twoways to make an OCI-based container image

    4 DAVS Design

    We take advantage of Dockerfile to track potentially vulnerable files (PVFs).In detail, Dockerfile contains a set of instructions that guide the docker daemon to run commands to build the docker image.By inspecting Dockerfile, the activity of container image-making progress is revealed.DAVS,as shown in Fig.2, the container image will be analyzed through three steps:Reversing Dockerfile,Layer mapping,Potentially Vulnerable Files extraction.After these steps, the layer objects containing PVFs information are fed to the CVE-Bin-Tool to detect CVEs related to each container image layer.

    Figure 2: DAVS design.Container image scanning using Dockerfile analysis

    4.1 Dockerfile Reversing

    While storing the container image in a registry, Dockerfile is not attached in the compressed image.Therefore, we need a method to reverse (or extract) the Dockerfile from an unknown container image.

    The OCI does not mention how to make an OCI-based image.However, there is a list of configurations that a container image should follow.Docker donated their image specification to OCI.In other words, OCI images can be built from Dockerfile.Buildah [22] is a popular project that supports build OCI-based images from Dockerfile.In contrast, a Docker image should have a similar configuration to an OCI-based image.Each container image contains the manifest file, which stores general information about the image, including the activities during the image-making progress.Taking advantage of the information described in the OCI standard, we develop the Dockerfile reversing algorithm from any OCI-based image (including Docker container image).

    The workflow ofDockerfile reversing algorithmis described in detail in Fig.3.The algorithm is developed by following two main steps.First, we extract the history field from the manifest file.There are several components inside the history field.Each component contains three properties:created,created_byandempty_layer.Thecreatedproperty informs the time of the action mentioned increated_by.Theempty_layerproperty tells us whether this action will create an empty layer or not.Second, we translate the history component to the instruction name.Thecreated_byproperty has two types of initiation:#(nop)andnon-#(nop).Non-#(nop)command will be translated toRUNInstruction.The first component will becomeFROMInstruction.#(nop)command contains the Instruction’s name right after the#(nop)mark.

    Figure 3: Dockerfile reversing algorithm for OCI-based container image

    4.2 Layer Mapping

    After getting the Dockerfile from the container image, we need to align each Instruction with its respective layer correctly.The Layer Mapping module ensures the correct process for extracting PVFs.For example, the analysis of Dockerfile figures out that the second Instruction (e.g., RUN command try to download a binary from the Internet) could generate PVFs.However, the second Instruction is used to guide the building framework to make the first image layer.As a result, the failed mapping between each Instruction in Dockerfile makes the finding PVFs broken.

    Following the guideline of Dockerfile Reference [23], FROM, RUN, ADD, COPY are instructions that guide the Docker daemon to create a new layer.Based on the Dockerfile, we can know the order of the Instructions.The layer’s name can be extracted from the manifest of the containerimage.However, it has a reverse order compared to the Dockerfile.Therefore, we have carefully mapped the layer with the Instruction in Dockerfile.

    The mapping layer object contains the following structure:

    ?Type of Instruction: is layer or not

    ?File list: The list of files that belong to this mapping

    ?Potentially vulnerable files: The list of files that might be vulnerable

    ?Layer ID: the corresponding Layer ID of the container image

    The mapping process is described in Fig.4.The method takes the Dockerfile content (reversed from a container image) and the Layer ID list, extracted from the container image manifest, as the input and returns the complete mapping (in a list of mapping layer objects).

    Figure 4: The mapping algorithm of Dockerfile’s Instructions and OCI-based container image layers

    4.3 PVF (Potentially Vulnerable File) Extraction

    The most crucial step of DAVS is to analyze the Dockerfile to locate which part of the container image needs to be checked.Dockerfile neatly reflects the activities of the image-making process.Following this behavior, DAVS determines the list of files that we need to scan further, but these files should not overlap with the previous scanning solution for saving cost.

    Potentially Vulnerable Files (PVFs) are the list of files that are added into the layer or downloaded from the local network (or the Internet) or other file-sharing sources.These files are custom service which is not installed by the package manager (e.g., dpkg).PVFs are also binary files with the executing privilege or shared object files intended to load by a program.DVAS will not focus on the file that is trusted.For example, the based image from official vendors such as Alpine, Ubuntu, Redhat.

    Based on the definition, we filter out the PVFs from the container image layer-by-layer using the Dockerfile information and the mapping from the previous step with the following rules:

    ?FROM instruction layer:The files inside FROM instruction layer are from the based operation system (e.g., alpine, ubuntu, centos), from which the container image is built.Therefore, we don’t need to extract the vulnerable files list from this layer if the layer is from a well-known operating system.

    ?ADD/COPY instruction layer:The files inside this layer are always needed to check for vulnerability.Therefore, we need to filter out the files which have the executable privilege.

    ?RUN instruction layer:In the action guided byRUNinstruction, the author may download the extra files by usingwget, curl, scp, ftp, nc andother network establishment commands.In addition, if theRUNinstruction contains make, build, setup and other compiling commands required to be checked.Moreover, ifRUNinstruction contains downloadable and compilable commands, all the executable files will become PVFs.

    Fig.5 shows the parts in Dockerfile covered by DAVS and scanning tools (e.g., Clair).The highlighted sections are files added to the container image or loaded from the Internet and directly compiled during image building.Besides, the scanning tool only covers the packages installed in the image through the package manager apt-get.Obviously, this image’s most important components (i.e.,FFmpeg application)are compiled directly via the make install command.Therefore, the package manager (e.g.,apt-get) cannot store FFmpeg’s information.The scanning tool will now ignore large amounts of information about the packages contained in the images, resulting in a lack of vulnerability detection.

    Figure 5: Comparison of the coverage parts between PVFs extraction method and Clair (a popular image scanning tool).Green highlights represent PVFs extraction coverage.Yellow highlights represent Clair coverage

    4.4 Vulnerability Checking

    After getting the potentially vulnerable files (PVFs) list, we use CVE-Bin-Tool [24] to extract the name and the version to which PVFs belong.We considered the limitation of CVE-Bin-Tool, which only provides a set of well-known software as well as the string extraction and matching to detect known software versions.However, this work does not focus on finding new vulnerabilities but help developers and container system administrator be aware of the risk of using certain container images.

    Fig.6 shows the workflow of scanning an OCI-based image.The container layer can be reused in several container images.DAVS extracts and scans PVFs independently for each layer (identified by layer ID).Detection results are also saved corresponding to each layer, identified by layer ID.In the case of images used the same couple of layers, the scanned layers do not need to be re-executed to increase system performance.

    Figure 6: Vulnerability checking progress

    5 Experience Setup and Evaluation

    This paper has several research questions to evaluate the proposed scheme:

    ?RQ1:How well doesDAVSdetect known CVE on vulnerable images over the previous container image scanning solution?

    ?RQ2:How much is the detecting coverage rate that DAVS could be used to improve previous container image scanning solutions?

    ?RQ3:What is the situation of real-world container image in popular public registries?

    5.1 Experience Setup

    We collect and download the container images from public registries to build two datasets: (1)Container images contain known vulnerabilities; (2) The latest updated container images on Docker Hub come from many different developers.For the (1) datasets, we archived 10 images from Vulhub[25], the collection of vulnerable images for training purposes.The detail of dataset (1) is shown in Tab.2.For the (2) datasets, we archived 1200 top latest updated containers from Docker Hub [26], 200 from quay.io [27].

    Table 2: Dataset (1) evaluation.The number of known vulnerabilities related CVEs

    We use Python3 as the primary coding language for the DAVS framework.The framework is run in an Intel NUC mini PC with a Core-i3 chipset and 8 GBs of Memory, running Ubuntu 20.04 LTS.

    5.2 Evaluation

    RQ1: Detection of related CVEs to the known vulnerable container images

    Dataset (1) is used to check the vulnerability of corresponding image detection accuracy.A package of a specific version may be affected by multiple CVEs.Therefore, we not only define the exact number of related CVEs (i.e., CVEs that affect the package) but also check the CVE’s ID that vulnerable images are built for.

    We compare the detection accuracy of DAVS with Clair-The most popular container image scanning solution.Clair scans the whole image as usual.In contrast, CVE-Bin-Tool is designed to scan a set of files or directories, not for the container image.Therefore, we extract the image from the repository using Docker save command.After that, we scan the whole extracted file from the image.Tab.1 shows the evaluation result of the dataset (1).Clair scans images very fast because it extracts package information from package manager metadata.However, Clair gives low accuracy when 9/10 images could not detect the correct CVE ID for which the target images are built.We use CVE-Bin-Tool to scan all of the files in the image.Nevertheless, the scanning time is high, as shown in Fig.7.DAVS, with itsPVFsfiltering rules, keeps the high accuracy of detecting related CVEs of the target vulnerable image and significantly decreases the scanning time compared to all files scanning using CVE-Bin-Tool.

    Figure 7: Scanning time comparison (in ms)

    RQ2: The extra number of CVEs that DAVS outperform Clair.

    We inspect the number of CVEs that DAVS and Clair can detect on both Datasets (1) and (2).We also filter the number of CVEs that DAVS and Clair overlap.As shown in Fig.8, the number of CVEs detected by DAVS accounts for more than 50% of the CVEs that DAVS and Clair can detect, which proves the PVFs filtering rules work well.On the other hand, the overlap rate is inconsequential.

    Figure 8: The detected CVEs rate (number of detected CVEs over the total of DAVS and Clair) that DAVS and Clair can archive

    We built an automatic crawler for dataset (2) to obtain the list of container images in Docker Hub and Quay.io.Then directly pull and scan the images with DAVS and Clair.While evaluating the real-world container images from DockerHub, we found that DAVS detects an extra 53% of CVEs over Clair.In addition, Clair cannot detect any CVEs in 336 vulnerable container images, which are successfully discovered by our method.

    RQ3: The risk of using public container image.

    To evaluate the safety of using public container images, we use DAVS integrated with Clair for checking the dataset (2).Through all 1400 images, we found that nearly 68% of container images are vulnerable,asshownin Fig.9.Therefore, the use of public container images is not safe, especially from Docker Hub- the most popular container registry.

    Figure 9: The vulnerable images rate in real-world

    6 Discussion and Future Work

    DAVS is a solution to overcome the shortcomings of the previous container image scanning tools.While these projects rely on package managers’information, installed packages on the Internet or compiled during the building container image are ignored.With the Dockerfile analysis technique,DAVS tracks the workflow of the container image-making efficiently.Potentially Vulnerable Files are extracted and scanned that help to improve the detecting coverage.

    DAVS is still costly since it needs to check a list of files in an image layer.Even the scanning process is divided with the layer-by-layer scanning operation, the complexity of the PVFs filtering algorithm is still high.Moreover, DAVS depends on CVE-Bin-Tool, which has limited functionality, which is only implemented string extraction and inspection, on checking packages’names and versions of unknown binaries inside the container image.We let the optimization for our future work.

    We also consider that scanning solutions missed software errors due to many other reasons, such as the late update of the CVE database.Then, dynamic analysis solutions, such as anomaly detection,are needed to enhance the security of the container system.The checking of users’data in the cloud system while preserving privacy is a significant challenge [28-30].The integrity checking of container images is also one of our future works.

    Acknowledgement:This work is the extended work of“DAVS: Dockerfile Analysis for Vulnerable Scanning”inMobiSec2021:The5th International Symposiumon Mobile Internet Security,Jeju Island,South Korea.

    Funding Statement:This work was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea Government (MSIT) (No.2020-0-00952, Development of 5G edge security technology for ensuring 5G+ service stability and availability.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    嫁个100分男人电影在线观看| 欧美色欧美亚洲另类二区| 男人狂女人下面高潮的视频| 久久久精品大字幕| 欧美+日韩+精品| 亚洲国产高清在线一区二区三| 99国产极品粉嫩在线观看| 少妇被粗大猛烈的视频| 国产人妻一区二区三区在| 精品久久久久久久久av| 国产成人影院久久av| 中文字幕精品亚洲无线码一区| 老司机午夜福利在线观看视频| 中文字幕免费在线视频6| 啦啦啦韩国在线观看视频| 又黄又爽又免费观看的视频| av在线观看视频网站免费| 久久久久久久久久黄片| 中亚洲国语对白在线视频| 国内精品久久久久久久电影| 又黄又爽又刺激的免费视频.| 欧美绝顶高潮抽搐喷水| 国产男靠女视频免费网站| 亚洲一级一片aⅴ在线观看| 观看美女的网站| 最近在线观看免费完整版| 欧美日韩亚洲国产一区二区在线观看| 国产伦一二天堂av在线观看| 午夜福利在线观看免费完整高清在 | 91麻豆精品激情在线观看国产| 色综合站精品国产| 亚洲最大成人手机在线| 黄色丝袜av网址大全| 午夜日韩欧美国产| 亚洲中文字幕一区二区三区有码在线看| 最好的美女福利视频网| 国产一区二区激情短视频| 日本a在线网址| 国产淫片久久久久久久久| 国产亚洲欧美98| 久久人妻av系列| 不卡视频在线观看欧美| 午夜福利在线在线| 亚洲精品粉嫩美女一区| 久久久久九九精品影院| 老师上课跳d突然被开到最大视频| 午夜免费男女啪啪视频观看 | 在线免费观看的www视频| av视频在线观看入口| 亚洲欧美激情综合另类| 在线观看舔阴道视频| 91久久精品电影网| 亚洲国产欧美人成| 人妻丰满熟妇av一区二区三区| 免费av观看视频| 国产免费一级a男人的天堂| www.色视频.com| 亚洲av熟女| 国产亚洲欧美98| 色综合婷婷激情| 1000部很黄的大片| 女生性感内裤真人,穿戴方法视频| 午夜免费激情av| 精品午夜福利视频在线观看一区| 国产精品一区二区三区四区免费观看 | 国产三级在线视频| 俄罗斯特黄特色一大片| 成人鲁丝片一二三区免费| 波多野结衣巨乳人妻| 人妻夜夜爽99麻豆av| 免费不卡的大黄色大毛片视频在线观看 | 男女视频在线观看网站免费| 亚洲美女搞黄在线观看 | 人人妻,人人澡人人爽秒播| 男女下面进入的视频免费午夜| 亚洲图色成人| 午夜福利成人在线免费观看| 成人国产综合亚洲| 人人妻人人澡欧美一区二区| 国产精品一及| 少妇裸体淫交视频免费看高清| 午夜福利在线观看吧| 在线免费十八禁| 亚洲一区高清亚洲精品| 成人综合一区亚洲| 看十八女毛片水多多多| 婷婷精品国产亚洲av在线| 欧美日韩黄片免| 亚洲精品在线观看二区| 日本精品一区二区三区蜜桃| 久久中文看片网| 欧美xxxx黑人xx丫x性爽| 国产成人aa在线观看| 在现免费观看毛片| 校园春色视频在线观看| 中国美白少妇内射xxxbb| 日韩国内少妇激情av| 亚洲一区二区三区色噜噜| 在线观看av片永久免费下载| 欧美性感艳星| 成年人黄色毛片网站| 色尼玛亚洲综合影院| 真实男女啪啪啪动态图| 99久久九九国产精品国产免费| 国产乱人视频| 国模一区二区三区四区视频| 99热这里只有是精品在线观看| 又爽又黄a免费视频| 国产精品野战在线观看| 亚洲精品一区av在线观看| 一进一出好大好爽视频| 亚洲七黄色美女视频| 成人二区视频| 日韩在线高清观看一区二区三区 | 国产大屁股一区二区在线视频| 在线免费十八禁| 性插视频无遮挡在线免费观看| av女优亚洲男人天堂| 乱码一卡2卡4卡精品| 日韩一区二区视频免费看| 国产精品一区二区三区四区免费观看 | 亚洲专区中文字幕在线| 亚洲av.av天堂| 最近中文字幕高清免费大全6 | 亚洲国产日韩欧美精品在线观看| 一进一出抽搐gif免费好疼| 男女做爰动态图高潮gif福利片| 少妇裸体淫交视频免费看高清| 免费观看的影片在线观看| 欧美3d第一页| 国产成人一区二区在线| 亚洲综合色惰| 69av精品久久久久久| 亚洲欧美激情综合另类| 国产激情偷乱视频一区二区| 精品一区二区三区视频在线观看免费| 久久久久久久久大av| 日本a在线网址| 久久久久性生活片| netflix在线观看网站| 不卡一级毛片| 五月玫瑰六月丁香| 亚洲精品影视一区二区三区av| 国产视频内射| 亚洲av中文字字幕乱码综合| 国产高清激情床上av| 日本a在线网址| 麻豆精品久久久久久蜜桃| 国产色婷婷99| 精品不卡国产一区二区三区| 久久99热这里只有精品18| 搡老妇女老女人老熟妇| 国产亚洲欧美98| 国产白丝娇喘喷水9色精品| 最好的美女福利视频网| a级毛片免费高清观看在线播放| 午夜福利视频1000在线观看| 亚洲不卡免费看| 久久精品国产亚洲av涩爱 | 美女xxoo啪啪120秒动态图| 免费看美女性在线毛片视频| 非洲黑人性xxxx精品又粗又长| 人妻制服诱惑在线中文字幕| 无遮挡黄片免费观看| 国产精品自产拍在线观看55亚洲| 国产日本99.免费观看| 成人欧美大片| 99精品在免费线老司机午夜| 国产免费一级a男人的天堂| 亚洲综合色惰| 精品久久久久久久末码| av专区在线播放| 两个人的视频大全免费| 99热只有精品国产| 亚洲va在线va天堂va国产| 成人亚洲精品av一区二区| 韩国av一区二区三区四区| 99久久久亚洲精品蜜臀av| 日日撸夜夜添| 久久久久九九精品影院| 联通29元200g的流量卡| 中文亚洲av片在线观看爽| 成人三级黄色视频| 我要搜黄色片| 干丝袜人妻中文字幕| 真人做人爱边吃奶动态| 我的老师免费观看完整版| 在线免费观看的www视频| 午夜福利在线观看吧| 亚洲久久久久久中文字幕| 中文字幕av在线有码专区| 国产精品一区二区三区四区免费观看 | av天堂中文字幕网| 亚洲美女视频黄频| 午夜福利在线观看吧| 校园春色视频在线观看| 国产高清不卡午夜福利| 亚洲av免费在线观看| 日本爱情动作片www.在线观看 | 国产真实乱freesex| 老司机福利观看| av在线蜜桃| 国产精品国产三级国产av玫瑰| 91久久精品国产一区二区三区| 一本一本综合久久| 亚洲在线观看片| 国产白丝娇喘喷水9色精品| 一级a爱片免费观看的视频| 国产91精品成人一区二区三区| 在线观看美女被高潮喷水网站| 亚洲国产精品成人综合色| 午夜爱爱视频在线播放| 少妇的逼水好多| 91久久精品电影网| 亚洲狠狠婷婷综合久久图片| xxxwww97欧美| 国产毛片a区久久久久| 亚洲成人精品中文字幕电影| 午夜亚洲福利在线播放| 窝窝影院91人妻| 悠悠久久av| 国产高清视频在线观看网站| 午夜爱爱视频在线播放| 午夜日韩欧美国产| 村上凉子中文字幕在线| 91在线精品国自产拍蜜月| 91精品国产九色| 窝窝影院91人妻| 成人国产麻豆网| av视频在线观看入口| 如何舔出高潮| 精品不卡国产一区二区三区| 十八禁网站免费在线| 日韩 亚洲 欧美在线| 日韩,欧美,国产一区二区三区 | 日韩亚洲欧美综合| 中文字幕高清在线视频| 久久国产乱子免费精品| 狂野欧美白嫩少妇大欣赏| 波多野结衣巨乳人妻| 成人毛片a级毛片在线播放| 69人妻影院| 人妻久久中文字幕网| 国产精品一区二区三区四区免费观看 | 精品久久久噜噜| 国产 一区精品| 免费观看人在逋| 干丝袜人妻中文字幕| 麻豆久久精品国产亚洲av| 欧美精品国产亚洲| xxxwww97欧美| 悠悠久久av| 欧美性猛交黑人性爽| 很黄的视频免费| 亚洲人成网站在线播放欧美日韩| 国产av不卡久久| 熟女人妻精品中文字幕| 欧美日韩综合久久久久久 | 在现免费观看毛片| 欧美高清成人免费视频www| 国产精品国产三级国产av玫瑰| 日本欧美国产在线视频| 亚洲欧美日韩高清在线视频| 欧美日韩黄片免| 亚洲内射少妇av| 无人区码免费观看不卡| 国内精品一区二区在线观看| 五月玫瑰六月丁香| 最近在线观看免费完整版| 国产av麻豆久久久久久久| 成人av一区二区三区在线看| 男女边吃奶边做爰视频| 亚洲成a人片在线一区二区| 久久久久久久久久成人| 热99在线观看视频| 欧美性感艳星| aaaaa片日本免费| 亚洲国产高清在线一区二区三| 亚洲内射少妇av| 国产中年淑女户外野战色| netflix在线观看网站| 精品人妻视频免费看| а√天堂www在线а√下载| 亚洲美女搞黄在线观看 | 亚洲欧美日韩高清在线视频| ponron亚洲| 淫秽高清视频在线观看| 特大巨黑吊av在线直播| av.在线天堂| 国产亚洲91精品色在线| 国产成人a区在线观看| 久久久久久九九精品二区国产| 亚洲狠狠婷婷综合久久图片| 欧洲精品卡2卡3卡4卡5卡区| 免费在线观看影片大全网站| 少妇的逼好多水| 精品久久久久久久久久久久久| 在线天堂最新版资源| 日韩强制内射视频| 一进一出抽搐动态| 亚洲电影在线观看av| 免费高清视频大片| 久久精品国产99精品国产亚洲性色| 日韩国内少妇激情av| 亚洲精品在线观看二区| а√天堂www在线а√下载| 中文字幕免费在线视频6| 村上凉子中文字幕在线| 深夜精品福利| 午夜激情福利司机影院| 精品久久久噜噜| 日日撸夜夜添| 国产中年淑女户外野战色| 亚洲最大成人中文| 国产精品免费一区二区三区在线| 国产中年淑女户外野战色| 黄色一级大片看看| 色噜噜av男人的天堂激情| 色视频www国产| 在线观看66精品国产| 五月玫瑰六月丁香| 国产v大片淫在线免费观看| 一级黄色大片毛片| a级毛片a级免费在线| 欧美丝袜亚洲另类 | 国产91精品成人一区二区三区| 最后的刺客免费高清国语| 免费人成在线观看视频色| 久久人人精品亚洲av| 欧美激情在线99| 国产高清三级在线| 亚洲美女黄片视频| 日韩高清综合在线| 欧美另类亚洲清纯唯美| 亚洲va日本ⅴa欧美va伊人久久| 黄色视频,在线免费观看| 久久久久久久久久久丰满 | 99国产极品粉嫩在线观看| 嫩草影院新地址| 亚洲第一电影网av| 国产精品福利在线免费观看| 午夜老司机福利剧场| 99久久九九国产精品国产免费| 深夜精品福利| 国产视频内射| 一区二区三区激情视频| 亚洲性夜色夜夜综合| 高清在线国产一区| 国产乱人视频| 中亚洲国语对白在线视频| 欧美潮喷喷水| 日日啪夜夜撸| 亚洲精品影视一区二区三区av| 亚洲三级黄色毛片| 日本色播在线视频| 可以在线观看的亚洲视频| 在线播放无遮挡| 五月伊人婷婷丁香| 真人一进一出gif抽搐免费| 国产伦在线观看视频一区| 草草在线视频免费看| 日韩亚洲欧美综合| 久久久久国产精品人妻aⅴ院| 日本 av在线| 亚洲最大成人av| 欧美中文日本在线观看视频| 亚洲va日本ⅴa欧美va伊人久久| 1000部很黄的大片| 亚洲国产色片| 日韩,欧美,国产一区二区三区 | 亚洲av美国av| 国产日本99.免费观看| 九九在线视频观看精品| 在线观看美女被高潮喷水网站| av在线老鸭窝| 婷婷色综合大香蕉| 欧美成人免费av一区二区三区| 悠悠久久av| 亚洲七黄色美女视频| 久久久久免费精品人妻一区二区| 亚洲av.av天堂| 国产aⅴ精品一区二区三区波| 久久人人精品亚洲av| 性插视频无遮挡在线免费观看| 国产欧美日韩精品一区二区| 国产真实伦视频高清在线观看 | 欧美人与善性xxx| 亚洲一级一片aⅴ在线观看| 99精品久久久久人妻精品| 欧美激情久久久久久爽电影| 五月玫瑰六月丁香| 免费在线观看日本一区| 热99在线观看视频| 国产成人aa在线观看| 在线观看66精品国产| 欧美性感艳星| 日本熟妇午夜| 露出奶头的视频| 欧美极品一区二区三区四区| 欧美一区二区精品小视频在线| 88av欧美| 成人鲁丝片一二三区免费| 我的老师免费观看完整版| 亚洲黑人精品在线| 中国美白少妇内射xxxbb| 美女黄网站色视频| 老司机福利观看| 国产精品av视频在线免费观看| 精品无人区乱码1区二区| 亚洲国产高清在线一区二区三| 亚洲av第一区精品v没综合| 日本一本二区三区精品| 在线免费观看的www视频| 亚洲男人的天堂狠狠| ponron亚洲| 色播亚洲综合网| 淫妇啪啪啪对白视频| 精品不卡国产一区二区三区| а√天堂www在线а√下载| 窝窝影院91人妻| 99久久精品热视频| 欧美色视频一区免费| 91狼人影院| 免费电影在线观看免费观看| 精品无人区乱码1区二区| 亚洲专区国产一区二区| 舔av片在线| 国产成人a区在线观看| 一区福利在线观看| 国产69精品久久久久777片| 黄色一级大片看看| 日韩强制内射视频| 黄色配什么色好看| 超碰av人人做人人爽久久| 国产成人a区在线观看| 久久这里只有精品中国| www.www免费av| 三级国产精品欧美在线观看| 色播亚洲综合网| 91在线观看av| 少妇的逼好多水| 亚洲图色成人| 国产国拍精品亚洲av在线观看| 中文字幕免费在线视频6| 婷婷精品国产亚洲av在线| 99在线视频只有这里精品首页| 国产精品98久久久久久宅男小说| 天美传媒精品一区二区| 99热精品在线国产| 欧美性感艳星| 国产在线男女| 欧美精品国产亚洲| 天堂影院成人在线观看| 国产精品一区二区三区四区久久| 久久精品国产鲁丝片午夜精品 | 国产黄a三级三级三级人| 一本精品99久久精品77| 91av网一区二区| 在线免费观看不下载黄p国产 | 久久久成人免费电影| 国产中年淑女户外野战色| www日本黄色视频网| 嫩草影视91久久| 一个人观看的视频www高清免费观看| 亚洲性久久影院| 男女边吃奶边做爰视频| 尤物成人国产欧美一区二区三区| 88av欧美| 九色国产91popny在线| 日韩欧美精品v在线| 国产成人aa在线观看| 色哟哟哟哟哟哟| 久9热在线精品视频| 国产亚洲精品久久久久久毛片| 亚洲av熟女| 成人精品一区二区免费| 亚洲七黄色美女视频| 欧美日韩国产亚洲二区| 午夜老司机福利剧场| 亚洲色图av天堂| 国产精品嫩草影院av在线观看 | 久久亚洲精品不卡| 老师上课跳d突然被开到最大视频| 国产真实伦视频高清在线观看 | 搞女人的毛片| 日韩强制内射视频| 婷婷精品国产亚洲av| 校园人妻丝袜中文字幕| 九九在线视频观看精品| 免费观看的影片在线观看| 欧美绝顶高潮抽搐喷水| 国产精华一区二区三区| 国产午夜福利久久久久久| 好男人在线观看高清免费视频| 亚洲色图av天堂| 日韩强制内射视频| 赤兔流量卡办理| 亚洲18禁久久av| 美女高潮的动态| 又粗又爽又猛毛片免费看| 午夜老司机福利剧场| 97碰自拍视频| 麻豆国产av国片精品| 日本与韩国留学比较| 美女 人体艺术 gogo| 国产精品国产高清国产av| 久久久色成人| 一区二区三区激情视频| 99热这里只有是精品在线观看| 亚洲精品在线观看二区| 别揉我奶头 嗯啊视频| 3wmmmm亚洲av在线观看| 亚洲精品456在线播放app | 成年免费大片在线观看| 12—13女人毛片做爰片一| 99久国产av精品| 日本五十路高清| 欧洲精品卡2卡3卡4卡5卡区| 久久精品国产亚洲av香蕉五月| 真人做人爱边吃奶动态| 九九热线精品视视频播放| 成人永久免费在线观看视频| 黄色视频,在线免费观看| 亚洲中文日韩欧美视频| 午夜福利在线观看吧| 亚洲精品一卡2卡三卡4卡5卡| av女优亚洲男人天堂| 一进一出抽搐gif免费好疼| 日本欧美国产在线视频| 午夜福利18| 日本一本二区三区精品| 搡老妇女老女人老熟妇| 1000部很黄的大片| 校园春色视频在线观看| 国产一区二区亚洲精品在线观看| 小蜜桃在线观看免费完整版高清| 嫩草影院入口| 99视频精品全部免费 在线| 国产成人av教育| 欧美又色又爽又黄视频| 日韩欧美国产在线观看| 久久中文看片网| 午夜视频国产福利| 丰满乱子伦码专区| 一本精品99久久精品77| 超碰av人人做人人爽久久| av在线亚洲专区| 久久国内精品自在自线图片| av.在线天堂| 国产精品伦人一区二区| 97人妻精品一区二区三区麻豆| 男女那种视频在线观看| 日韩欧美免费精品| 麻豆久久精品国产亚洲av| 老司机福利观看| 男女边吃奶边做爰视频| 淫妇啪啪啪对白视频| 欧美成人性av电影在线观看| 白带黄色成豆腐渣| 美女cb高潮喷水在线观看| 亚洲电影在线观看av| 偷拍熟女少妇极品色| 国产熟女欧美一区二区| 亚洲av免费高清在线观看| 欧美日韩精品成人综合77777| 又爽又黄无遮挡网站| 长腿黑丝高跟| 亚洲三级黄色毛片| 国产精品久久久久久av不卡| 特级一级黄色大片| 简卡轻食公司| 亚洲 国产 在线| 亚洲天堂国产精品一区在线| 99久久中文字幕三级久久日本| 搞女人的毛片| 99久久无色码亚洲精品果冻| 日韩欧美 国产精品| 欧美国产日韩亚洲一区| 国产精品久久久久久精品电影| 国产伦在线观看视频一区| 一个人免费在线观看电影| 亚洲一区二区三区色噜噜| 国产美女午夜福利| 国产精品一及| 精品久久久久久久久久免费视频| 99国产精品一区二区蜜桃av| 日本免费一区二区三区高清不卡| 亚洲欧美激情综合另类| 天堂动漫精品| 麻豆一二三区av精品| 97热精品久久久久久| 永久网站在线| 日韩欧美在线二视频| 日日撸夜夜添| 日韩,欧美,国产一区二区三区 | 可以在线观看的亚洲视频| 中文字幕av成人在线电影| 女的被弄到高潮叫床怎么办 | 久久精品国产亚洲av天美| 日本五十路高清| 啦啦啦观看免费观看视频高清| 国产亚洲91精品色在线| 亚洲精品一卡2卡三卡4卡5卡| 一本久久中文字幕| 欧美bdsm另类| 国产aⅴ精品一区二区三区波| 一区二区三区四区激情视频 | 亚洲av第一区精品v没综合| 午夜久久久久精精品| 国产伦人伦偷精品视频| 欧美+日韩+精品| 国产美女午夜福利| 男人舔奶头视频| 天堂影院成人在线观看| 日韩欧美一区二区三区在线观看|