• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Review of blockchain-based DNS alternatives

    2017-04-12 06:39:13HUWeihongAOMengSHILinXIEJiaguiLIUYang

    HU Wei-hong, AO Meng, SHI Lin, XIE Jia-gui, LIU Yang

    (1. Beijing Teleinfo Network Technology Co., Ltd., Beijing 100095, China; 2. China Academy of Information and Communication Technology, Beijing 100191, China)

    Review of blockchain-based DNS alternatives

    HU Wei-hong1, AO Meng1, SHI Lin2, XIE Jia-gui1, LIU Yang2

    (1. Beijing Teleinfo Network Technology Co., Ltd., Beijing 100095, China; 2. China Academy of Information and Communication Technology, Beijing 100191, China)

    DNS Protocol was originally designed with no security protection in place. Subsequent DNSSEC added a layer of trust on top of DNS by providing authentication, but it still did not address issues such as DoS/DDoS attacks and deployment difficulties. Blockchain technology offers an innovative perspective to tackle those challenges. By reviewing and analyzing two prevail blockchain-based DNS alternatives (Namecoin and Blockstack), it is concluded that although blockchain presently have problems that have to be solved, it is a promising approach to build decentralized, secure and human-friendly naming systems.

    DNS, DNSSEC, decentralization, blockchain, Bitcoin, Namecoin, Blockstack

    1 Introduction

    The domain name system (DNS) was born in the Internet’s early days when the network was primarily used for academic and military purposes. The design of its distributed hierarchical structure made the system simple, scalable and resilient. Presently this system has been deployed almost on every computer in the world, which proves that this design philosophy successfully serves its purposes. However, there is one factor that was not top of the designers’ mind: security, because they never anticipated the Internet could be world widely adopted in the future. As a result, this DNS system is fundamentally vulnerable since its invention and was bothered by all kinds of security issues as the Internet continually develops. The most common one is named distributed denial of service (DDoS) attack. Most recently, in October, 2016, DDoS attacked the servers of Dyn[1], a company that controls much of the Internet’s DNS infrastructure, bringing down websites including Twitter, Netflix, Reddit, CNN and many other in the US and Europe. This attack is roughly twice as powerful as any similar attack on record, which makes it the largest of its kind in history. Other than DDoS which attacks DNS servers, there are several security vulnerabilities oriented from the flaws in the DNS protocol such as DNS cache poisoning and man in the middle attack which also threaten the security of DNS.

    Efforts to shore up DNS are ongoing. One such effort is the domain name system security extensions (DNSSEC) which aims to address these issues by adding security to DNS protocol while maintaining backward compatibility. DNSSEC was designed to provide DNS clients origin authenticated information and to prevent DNS data from being forged or manipulated, which makes it an effective weapon against attacks such as DNS cache poisoning. Basically, in a DNSSEC deployed zone, the DNS answers clients received are digitally signed. By checking the digital signature, clients are able to know whether the data contained in the answers is altered. Although DNSSEC guarantees the authentication and integrity of DNS data, it does not provide confidentiality of data, which means all DNSSEC data are not encrypted and visible to everyone. Another negative effect of DNSSEC is thatthe signing and verification of DNS data introduce additional overhead to the servers and network, thereby impacting the performance of DNS servers and making them more vulnerable to DDoS attacks. The complexity and difficulties of DNSSEC deployment also hinder the adoption. Additional workloads are placed on system administrators and organizations and the benefits that arise from this cost are not incentive enough for them to deploy DNSSEC.

    DNS was designed as a distributed database which enables it to scale and perform efficiently under variety of conditions. Despite the fact that DNS servers are distributed all over the world, DNS is also a centralized system in terms of administration and redundancy. All of those distributed components operate in reference to a central authority which could be viewed as a centralized point of failure. For example, the root zone is managed by IANA/ICANN, the former of which is administrated by the US government. On the other hand, the centralized hierarchy structure of current DNS exposes vulnerabilities to DDoS attack such as previously mentioned attacks to Dyn. Therefore, decentralized DNS is probably one direction to solve these issues. Tor[2]is a secure and decentralized system, but its primary objective is to achieve anonymity as opposed to decentralization. Therefore, the lack of capability of using human-meaningful names impedes its further adoption. Blockchain is another recently emerged technology which could be a promising solution to all the challenges DNS systems are facing. In this paper, several blockchain-based DNS alternative systems are reviewed and compared. Meanwhile, their merits and potential limitations are also discussed and analyzed.

    2 Background

    2.1 Blockchain

    Bitcoin[3]is a typical blockchain-based protocol, and probably is the most successful application of blockchain technology so far. Thus, we take Bitcoin as an example to brief some fundamental concepts of blockchain prior to the discussion of blockchain-based DNS protocols.

    Bitcoin’s self-explanatory name indicates that Bitcoin is a digital cryptocurrency. Fundamentally, it is a decentralized payment system which consists of four key components.

    1) The underlying network structure on which the system operates.

    2) The essential activity occurring in the system: transaction.

    3) Distributed public ledgers which keep track of all transactions.

    4) A mechanism which decides who is authenticated to record and verify transactions.

    Network: Unlike other centralized or hierarchical networks, the Bitcoin network is a peer-to-peer (P2P) payment network that operates on a cryptographic protocol. Nodes can join and leave the network freely. Transactions are broadcast to all nodes using a flood protocol. Messages are delivered on a best effort basis. Through the use of P2P network, the transaction database is managed autonomously. Every node keeps a copy of transaction database locally and no centralized official copy exists. Upon joining the network, a new node bootstraps itself by downloading and verifying data from other nodes to complete its local copy.

    Transaction: As a digital currency, the basic functionality of Bitcoin is circulating in the system. A certain amount of Bitcoin transferred from one user to another forms a transaction. The sender issues a transaction/payment by signing it with its private key. Then the transaction will be spread through the network and every node receiving it will verify the signature using the sender’s public key. Eventually the transaction reaches a legitimate bookkeeper (aka. miner) where it is queued for further processing.

    Blockchain: The database which consists of all transactions is organized by blocks. Each block contains the hash of the previous one, making the database a chain of blocks, namely block chain. In a block, every transaction has a hash associated with it. The data integrity is secured by Merkle root which is the hash of all the hashes of all the transactions in the block. It is noteworthy that in the Bitcoin system, there is no such concept that one can stash unspent money somewhere on/off the block chain. This information can be gained by tracing back all the historical transactions related to this person.

    Mining: In the Bitcoin system, there are plenty of nodes who are willing to do the bookkeeper job because they can gain rewards for verifying and recording transactions. However, to maintain global consensus in the whole system, only one node is elected to create a new block and package transactions into it. This election process involves solving a math problem. Whoever first finds the solution becomes the leader and has the authority to generate a new block which will be filled with pending transactions and broadcast to all nodes. Other nodes accept the new block only if the transactions within it are valid. Then, they can start working on the math problem for the next new block. The election process is named “mining” and the participants are miners.

    2.2 DNS security

    For a domain name system, one can identify its security level using RFC 3833[4]which is originally created to determine if DNSSEC meets the security goals. In this subsection, some well-known DNS attacks are briefly described and will be utilized to evaluate the security of blockchain-based DNS systems discussed in next section.

    As the DNS primarily relies on unencrypted UDP packets to carry information, there is no guarantee for end-to-end data integrity. It is easy for an attacker to intercept the DNS traffic or alter the DNS data (modifying the answer to refer to another IP, or returning an NXDOMAIN code which tells the client that the domain does not exist) using a man-in-the-middle attack. Common DNS attacks such as DNS cache poisoning, DNS ID hacking and DNS spoofing fall into this category, namely DNS protocol attack.

    As many other Internet services, the DNS is vulnerable of DoS/DDoS attacks. The attack target is DNS servers in place of the weakness of DNS protocol. A DoS attack is a malicious attempt to make a server or a network unavailable to users usually by sending a flood of requests to a server. When the load exceeds capacity, the server will not be able to respond to normal requests. In DDoS attacks, a network of computers infected with special malware are coordinated into bombarding a server with traffic until it collapses under the strain. This type of attack is the one of the hardest to defense against in the Internet.

    There is another attack whose direct target is neither DNS protocol nor DNS servers. Most network devices send DNS queries to a trusted recursive resolver which can be arranged by network providers via DHCP protocol. If the trusted server is compromised or the client is configured to use a malicious resolver, for example, by attacking DHCP servers, DNS queries will be sent to attackers who may respond with whatever they want.

    2.3 Zooko’s triangle

    Zooko Wilcox-O’Hearn proposed that there are three properties that are generally desired to have in a naming protocol[5].

    Fig.1 Zooko’s triangle

    1) Human-meaningful: the name provided to users should be meaningful and easy to remember and write without errors.

    2) Secure: a name can only be resolved to one, unique and correct entity, even in the presence of untrusted nodes.

    3) Decentralized: no central authority in the system and untrusted nodes are probably present.

    He conjectured that in a key-value system in which the keys address values, compromise must be made between those three properties. In other words, you may have at most two out of the three properties in the system. This claim has been used to evaluate where a system stands on the evolution path to a perfect naming system. For example, the DNS name is human usable but the system is not distributed or secure. DNSSEC addresses the security issue on the top of DNS, therefore it has two properties except decentralization. Another example is the Tor naming system, which is secure and distributed, but the addresses are not human-meaningful. Fortunately, Wilcox-O'Hearn’s claim was conjecture and is not necessarily correct. It is possible that naming systems are able to possess all three properties, or at least approach the third. Such systems will be discussed in the following sections.

    3 Blockchain-based DNS alternatives

    3.1 Namecoin

    Namecoin[6]is the first blockchain-based DNS system. It is a fork of Bitcoin with modifications which allow the blockchain to store name-value data other than transactions. Thus, Namecoin and Bitcoin share the most functionalities and mechanisms. For example, they utilize the same math problem for mining so miners are able to mine in both systems without consuming double computing power, aka. merged-mining. However, this may raise potential security risks which will be discussed in details.

    Namecoin was designed as a more general name-value resolving system rather than a substitution of the current DNS system. In addition to the domain name, Namecoin can map other types of name-value pair which are differentiated by a prefix. For example, the “d/” prefix is used for domain names and “id/” is used to register identities. Namecoin uses the virtual .bit top-level domain name which is not officially registered in current DNS system. This means Namecoin is isolated from the DNS system and users cannot resolve .bit domain names without installing additional resolving software. Namecoin provides complete functionalities for registering, renewing and transferring a domain as traditional DNS does.

    3.2 Blockstack

    Blockstack[7]is the first naming system which operates directly on top of the Bitcoin blockchain. Formerly it was Onename and built on top of Namecoin. After a security crisis of Namecoin, the development team decided to migrate the whole system to the Bitcoin blockchain. Therefore, the ability to migrate across different blockchains became one of their design philosophies and the name is also changed to Blockstack which reflects the concept of layered blockchains.

    Feature-wise, Blockstack combines a DNS system with PKI (public key infrastructure). We skip discussing the latter as it is out of the scope of this paper. Both Namecoin and Blockstack share the similar DNS functionality with one major difference stemming from Blockstack’s distinctive multi-layer blockchains. Namecoin stores name-value pair data on the blockchain. Thus, the maximum length of a domain name is 64 characters. Otherwise the blockchain will grow too fast. On the contrary, Blockstack is built on top of the Bitcoin blockchain which cannot accommodate large data such as name-value pair information. Therefore, a separate logical layer, i.e. virtualchain, on top of the blockchain is proposed to maintain the naming systemwhile the underlying blockchain is only used for achieving consensus on the state of the naming system and the integrity of name-value data records. Decoupling the naming system logic and consensus mechanism is a significant improvement over Namecoin. Not only can Blockstack increase the data storage capacity considerably, but allows the logical layer to improve and extend independently.

    3.3 Nebulis and more

    Another project similar to Blockstack is a platform called Nebulis[8], a global distributed directory which intended to upgrade and replace the existing DNS using blockchain. The difference between the two is that their platform uses IPFS[9]or MaidSafe[10]as a replacement for HTTP and utilizes the Ethereum[11]blockchain for DNS capabilities.

    There are other blockchain-based naming systems such as Emercoin[12]and EtherID[13]which may focus on other aspects of a DNS system such as name squatting, pricing policies. These are more of social or economic issues than technical problems. Fundamentally they share the similar underlying technology with Namecoin or Blockstack.

    4 Discussion and analysis

    4.1 The advantages

    In terms of Zooko’s Triangle theory, blockchain-based DNS systems have all the three properties. They inherit most merits of decentralization as the underlying blockchain is natively decentralized. Unlike the current DNS which is administrated and controlled by an organization, there are no authorities in blockchain-based DNS. All the nodes equal to each other. Only owners can make changes to existing records with their private key. It is almost impossible for authorities to make changes to the domain name records.

    With respect to security, blockchain-based DNS has obvious advantages as well. Traditional DNS is vulnerable to variety of attacks due to protocol flaws. Even with the enhancement of DNSSEC, it still cannot thwart DoS/DDoS attacks. On the contrary, since all domain names are locally stored on every node, there is no need for the client to query the names by interacting with remote servers. Therefore, all the man-in-the-middle attacks present in traditional DNS no longer exist in blockchain-based DNS. The DoS/DDoS cannot impact the name resolution either because all the lookups are performed locally. Another benefit associated with local lookup is privacy protection. Traditional DNS/DNSSEC does not encrypt the data, which means it is visible to everyone and your privacy information (such as the websites you like and your usage pattern) is possibly exposed to malicious eavesdroppers.

    In summary, blockchain-based DNS systems possess all the three properties for a naming system. They are immune to attacks traditional DNS usually suffers such as protocol attacks and server attacks. Additionally, they can offer privacy protection for the clients. It all looks like blockchain technology is a perfect solution for a naming system. But do blockchain-based DNS systems have any disadvantages? The answer is yes.

    4.2 Problems still remain

    Blockchain technology presents a new perspective on information security. Traditionally data is protected usually by building walls and isolating them from known attacks. This reactive approach may not be applicable in the increasingly connected digital society. A better strategy is building robust and resilient systems which can defense against any attack in a proactive manner. Bitcoin was originally designed as such a system. However, as the adoption of Bitcoin was increasingly widespread, shortcomings and security vulnerabilities gradually exposed.

    51% attack: When Bitcoin was proposed, its security foundation was based on the “one-CPU-one-vote” mechanism, in which case it is nearly impossible that 51% of the voters are not honest.Clearly the inventor of Bitcoin did not foresee the evolution in mining gears. Profit drives miners to upgrade their computing power. Various technologies have been used for mining such as CPU, GPU, FPGA and even ASIC. Furthermore, computing power can be united together, forming a “mining pool” to generate blocks more quickly and therefore individual miner can receive a portion of the reward on a consistent basis. The intention of mining pool sounds plausible. But when the computing power of a single pool approximates 50% of the entire computing power on the network, it may raise serious security concerns because the pool has the capacity to sabotage security and trust foundation of the system even if it intends not to do so. In late 2014, a mining pool consistently had more than 51% of the total computing power on Namecoin. And there was an even worse situation. Blockstack observed a mining pool controlled up to 75% of the computing power during a particular week, indicating Namecoin was actually controlled by a single party who was capable of undermining the security of Namecoin. This situation is probably caused by the“merged-mining” mechanism. A lot of profit-seeking large mining pools mine coins in both Namecoin and Bitcoin at the same time to maximize their profit. However, the rest miners only mine Bitcoin and they do not have incentive to mine other coins, which makes Namecoin less secure against 51% attack than Bitcoin. Due to this security concern, Blockstack migrated the whole system form Namecoin to Bitcoin. Nevertheless, the possibility of 51% attack still exists in Bitcoin system and it remains an open problem that needs to be addressed in the future.

    Performance: The current Bitcoin protocol limits the generation rate of new blocks at 1 block per ten minutes or so, which makes the system can only accept up to 7 transactions per second. As more applications operate on Bitcoin, this will eventually become the bottleneck of Bitcoin and significantly delay the confirmation of transactions. Increasing block size can mitigate this issue. But changing block size is a very complicated problem and the Bitcoin developers and communities are still debating its pros and cons. Modifying block size requires a hard fork, which mean if it is not adopted by almost all the nodes, Bitcoin could split into separate payment networks permanently. For a naming system built on top of Bitcoin, this is a difficulty which has to be tackled or circumvented. But if a naming system uses its exclusive blockchain, this is only a problem one needs to take into consideration when designing the system.

    Last mile problem: Blockchain is a distributed system, meaning every node keeps a complete copy of blockchain data locally. As of Dec. 2016, the blockchain size of Bitcoin is 91 GB[14]and still counting. For Namecoin, the blockchain size currently is 4.69 GB[15]and it is expected that the size will significantly increase when scaling to millions of users in the future. Therefore, storing and maintaining massive blockchain data at every node might not be viable. For example, modern mobile devices such as smartphones usually do not have sufficient storage space for Bitcoin’s blockchain data. Moreover, messages and transactions are delivered in a flood fashion, which means mobile devices have to be waked up frequently to process received events thereby increasing battery consumption dramatically. Namecoin offered a tradeoff solution to balance decentralization and feasibility. Specifically, a node with full local copy of blockchain data can act as a traditional DNS recursive resolver by listening to port 53. Mobile devices can send DNS queries to this resolver for name lookup. However, this solution leaves data exchange between clients and resolvers unprotected like traditional DNS does. Previously mentioned DNS protocol attacks and server attacks become security threats again. This is the“l(fā)ast mile” problem for a blockchain-based DNS system, and is an area of future research.

    5 Conclusion

    Blockchain technology is an unstoppable force that could converge to a storm of computing revolution that would profoundly reshape not only businesses and societies, but also variety of Internet services. In this storm, blockchain-based DNS systems are forerunners of this Internet innovations from whom we can learn lessons. Essentially, blockchain technology is a candidate of great promise for the next generation DNS system in that it inherently possesses the qualities of censorship-resistance, security, and resilience. On the other hand, there still are issues such as 51% attack and last mile problem which have to be addressed by the endeavor of blockchain communities and researchers before blockchain-based DNS can be standardized and deployed in practice.

    [1] Dyn Statement on 10/21/2016 DDoS attack[EB/OL]. http://dyn. com/ blog/dyn-statement-on-10212016-ddos-attack/.

    [2] DINGLEDINE R, MATHEWSON N, SYVERSON P. Tor: the second- generation onion router[J]. Journal of the Franklin Institute, 2004, 239(2): 135-139.

    [3] NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[J]. Consulted, 2009.

    [4] ATKINS D, AUSTEIN R. RFC3833: Threat Analysis of the Domain Name System (DNS)[J]. Internet Engineering Task Force, 2004, 5(1):108-117.

    [5] WILCOX-O'HEARN Z. Names: decentralized, secure, humanmeaningful: choose two[EB/OL]. https://web.archive.org/web/ 20011020191610/http://zooko.com/distnames.html.

    [6] Namecoin[EB/OL].https://Namecoin.info.

    [7] ALI M, NELSON J, SHEA R, et al. Block stack: a global naming and storage system secured by block chains[C]//2016 USENIX Annual Technical Conference (USENIX ATC 16). 2016: 181-194.

    [8] Nebulis[EB/OL].https://www.nebulis.io/.

    [9] IPFS (the InterPlanetary File System)[EB/OL]. https://github. com/ ipfs/ipfs.

    [10] IRVINE D. MAIDSAFE.NET: US, EP2118808[P]. 2009.

    [11] Ethereum project[EB/OL]. https://www.ethereum.org/.

    [12] Emercoin [EB/OL]. http://emercoin.com/DNS_and_Name-Value_ Storage.

    [13] Ethereum decentralized DNS[EB/OL]. http://etherid.org/.

    [14] Bitcoin blockchain size[EB/OL]. https://blockchain.info/charts/ blocks-size.

    [15] Namecoin (NMC) statistics[EB/OL]. https://bitinfocharts.com/Namecoin/.

    About the authors:

    AO Meng (1982-), Daur nationality, born in Inner Mongolia. He received his Ph.D. degree at Institute of Automation, Chinese Academy of Sciences in pattern recognition and artificial intelligence in 2009. His research interests include artificial intelligence and blockchain technology.

    SHI Lin (1988-), born in Shandong. He is an engineer at CAICT with years of experience in information security. Currently, he is the lead of trusted cloud security certification at institute of technology and standards research.

    XIE Jiagui (1984-), born in Shandong. He received his Master degree at Institute of Automation, Chinese Academy of Sciences. Currently he is the CTO of Beijing Teleinfo Network Technology Co., Ltd., and his research interests involve DNS and intelligent information system.

    LIU Yang (1986-), born in Gansu, PhD. He is a senior engineer at CAICT and the leader of the ID Working Group of AII (Alliance of Industrial Internet). His research focuses on industrial Internet, identification service and DNS.

    10.11959/j.issn.2096-109x.2017.00157

    Received data: 2016-12-19, Revised date: 2017-01-26. Corresponding author: HU Wei-hong, huweihong@teleinfo.cn

    热99re8久久精品国产| 中文亚洲av片在线观看爽| 精品久久久久久久末码| 麻豆久久精品国产亚洲av| 国产精品久久电影中文字幕| 美女cb高潮喷水在线观看| 琪琪午夜伦伦电影理论片6080| 亚洲国产精品合色在线| 久久国产精品人妻蜜桃| 中文字幕熟女人妻在线| 国产不卡一卡二| 中文资源天堂在线| 直男gayav资源| 在线免费十八禁| 在线观看一区二区三区| 小蜜桃在线观看免费完整版高清| 久久久久九九精品影院| 国产一区二区亚洲精品在线观看| 国产三级在线视频| 欧美最新免费一区二区三区| 国产精品野战在线观看| 国产精品久久久久久久久免| 精品久久久久久久末码| 国国产精品蜜臀av免费| 18禁黄网站禁片免费观看直播| 久久香蕉精品热| 色综合婷婷激情| 国产精品久久电影中文字幕| 别揉我奶头~嗯~啊~动态视频| 亚洲av一区综合| 亚洲综合色惰| 欧美+亚洲+日韩+国产| 亚洲国产精品合色在线| 精品人妻一区二区三区麻豆 | 日本色播在线视频| 亚洲中文字幕一区二区三区有码在线看| 亚洲精华国产精华液的使用体验 | 日本与韩国留学比较| 黄色日韩在线| 看黄色毛片网站| 亚洲不卡免费看| 又爽又黄a免费视频| 日韩欧美在线二视频| 欧美色视频一区免费| 日本a在线网址| 精品午夜福利在线看| 国产av在哪里看| 日韩中文字幕欧美一区二区| 成人永久免费在线观看视频| 99热这里只有是精品50| 欧美丝袜亚洲另类 | 少妇高潮的动态图| 欧美最黄视频在线播放免费| 老司机福利观看| 精品久久久久久久久av| 日韩精品有码人妻一区| 久久热精品热| 亚洲经典国产精华液单| 日韩在线高清观看一区二区三区 | 免费看光身美女| 国产探花在线观看一区二区| 免费黄网站久久成人精品| 久久久国产成人免费| 欧美zozozo另类| a级毛片免费高清观看在线播放| 搡女人真爽免费视频火全软件 | 国内精品久久久久精免费| 亚洲欧美精品综合久久99| 精品一区二区三区视频在线| 亚洲欧美日韩卡通动漫| 亚洲无线在线观看| 久久精品国产清高在天天线| 亚洲成人精品中文字幕电影| 一区二区三区激情视频| 熟妇人妻久久中文字幕3abv| 久久久久久久亚洲中文字幕| 亚洲精品456在线播放app | 欧美三级亚洲精品| 久久久久国产精品人妻aⅴ院| 少妇的逼水好多| 又黄又爽又刺激的免费视频.| 国产v大片淫在线免费观看| 可以在线观看的亚洲视频| 成人无遮挡网站| 国产高清有码在线观看视频| 亚洲av日韩精品久久久久久密| 久久久成人免费电影| 亚洲成人精品中文字幕电影| 亚洲专区中文字幕在线| 成年女人看的毛片在线观看| 少妇高潮的动态图| 中文资源天堂在线| 成人欧美大片| 乱码一卡2卡4卡精品| 精品99又大又爽又粗少妇毛片 | 久久久久久九九精品二区国产| 麻豆成人av在线观看| 亚洲美女视频黄频| 久久久午夜欧美精品| 午夜福利在线观看免费完整高清在 | 国产色爽女视频免费观看| 99热这里只有精品一区| 免费看av在线观看网站| 国产精品一区www在线观看 | 天堂网av新在线| 在线播放国产精品三级| 中出人妻视频一区二区| 亚洲成a人片在线一区二区| 别揉我奶头~嗯~啊~动态视频| 99riav亚洲国产免费| 免费人成视频x8x8入口观看| 乱人视频在线观看| 丰满乱子伦码专区| 黄色一级大片看看| 在线国产一区二区在线| 成人综合一区亚洲| av在线老鸭窝| 国产精品永久免费网站| 91麻豆av在线| 成年免费大片在线观看| 欧美xxxx性猛交bbbb| 午夜精品在线福利| 最后的刺客免费高清国语| 夜夜爽天天搞| 亚洲人与动物交配视频| 熟女人妻精品中文字幕| 国内精品宾馆在线| 毛片女人毛片| 少妇被粗大猛烈的视频| 亚洲自拍偷在线| 精品人妻1区二区| 老熟妇仑乱视频hdxx| 亚洲中文字幕一区二区三区有码在线看| 免费av不卡在线播放| 成人国产综合亚洲| 成人高潮视频无遮挡免费网站| 日韩在线高清观看一区二区三区 | 在线天堂最新版资源| 免费av不卡在线播放| h日本视频在线播放| 免费无遮挡裸体视频| 又黄又爽又免费观看的视频| 亚洲最大成人中文| 国产伦在线观看视频一区| 亚洲无线观看免费| 欧美高清成人免费视频www| 国产精品野战在线观看| 国产激情偷乱视频一区二区| 国产色婷婷99| 大又大粗又爽又黄少妇毛片口| 黄色欧美视频在线观看| 精品一区二区三区av网在线观看| 国产综合懂色| 国产在视频线在精品| 精品99又大又爽又粗少妇毛片 | 无遮挡黄片免费观看| 国产精品无大码| 国产一区二区三区av在线 | 两人在一起打扑克的视频| 国产中年淑女户外野战色| 精品人妻熟女av久视频| 久99久视频精品免费| 亚洲成人久久爱视频| 国产中年淑女户外野战色| 免费大片18禁| 久久这里只有精品中国| 婷婷六月久久综合丁香| 久久久久久久久大av| 亚洲精品色激情综合| 欧美区成人在线视频| 亚洲国产欧美人成| 女生性感内裤真人,穿戴方法视频| 国产一区二区激情短视频| 欧美性猛交黑人性爽| 91久久精品国产一区二区三区| 噜噜噜噜噜久久久久久91| or卡值多少钱| 免费观看人在逋| 精品免费久久久久久久清纯| 亚洲av熟女| 精品久久久久久久末码| 桃红色精品国产亚洲av| 久久国内精品自在自线图片| 久久九九热精品免费| 亚洲欧美日韩高清专用| 国产美女午夜福利| 九色国产91popny在线| 一级黄片播放器| 国内精品久久久久久久电影| 麻豆av噜噜一区二区三区| 91麻豆av在线| 亚洲第一电影网av| 国产成人a区在线观看| av专区在线播放| 日韩在线高清观看一区二区三区 | 看片在线看免费视频| 成人精品一区二区免费| 国产伦在线观看视频一区| 国内精品一区二区在线观看| 国产高清不卡午夜福利| 亚洲中文字幕日韩| 日韩欧美 国产精品| 久久欧美精品欧美久久欧美| 精品人妻视频免费看| 久久亚洲精品不卡| 日韩欧美三级三区| 国产黄a三级三级三级人| 露出奶头的视频| 亚洲七黄色美女视频| 中亚洲国语对白在线视频| 久久久色成人| 国产亚洲欧美98| 一卡2卡三卡四卡精品乱码亚洲| 久久精品国产鲁丝片午夜精品 | 九九久久精品国产亚洲av麻豆| 免费不卡的大黄色大毛片视频在线观看 | 成人午夜高清在线视频| 性色avwww在线观看| 日韩 亚洲 欧美在线| 老司机午夜福利在线观看视频| 亚洲美女搞黄在线观看 | 尤物成人国产欧美一区二区三区| 啦啦啦观看免费观看视频高清| 国产亚洲精品av在线| 成人国产综合亚洲| 精品一区二区三区人妻视频| 日本与韩国留学比较| 99热网站在线观看| 国产黄a三级三级三级人| 我要搜黄色片| www.www免费av| 精品人妻熟女av久视频| 如何舔出高潮| 欧美一级a爱片免费观看看| 搡老熟女国产l中国老女人| av福利片在线观看| 成人国产一区最新在线观看| 久久国产乱子免费精品| 国产私拍福利视频在线观看| 亚洲av日韩精品久久久久久密| 狠狠狠狠99中文字幕| 日本一二三区视频观看| 美女 人体艺术 gogo| 色av中文字幕| 成人综合一区亚洲| 看免费成人av毛片| 一区二区三区免费毛片| 性色avwww在线观看| 免费在线观看成人毛片| 蜜桃久久精品国产亚洲av| 精品久久久久久久人妻蜜臀av| 婷婷亚洲欧美| 日本免费一区二区三区高清不卡| 深夜a级毛片| 深夜精品福利| 两个人视频免费观看高清| 国产精品嫩草影院av在线观看 | 国产伦精品一区二区三区四那| 久久久久久久久久成人| 成人特级黄色片久久久久久久| 午夜福利在线在线| 国产91精品成人一区二区三区| 久久久久久国产a免费观看| 少妇猛男粗大的猛烈进出视频 | x7x7x7水蜜桃| 在线播放国产精品三级| 中文资源天堂在线| 日韩中文字幕欧美一区二区| 国产 一区精品| 亚洲av免费在线观看| 日韩欧美免费精品| 国产精品嫩草影院av在线观看 | 91在线观看av| 亚洲国产高清在线一区二区三| 亚洲乱码一区二区免费版| 88av欧美| 亚洲七黄色美女视频| 国产精品美女特级片免费视频播放器| 成人亚洲精品av一区二区| 午夜视频国产福利| 欧美日韩国产亚洲二区| 国产亚洲精品久久久久久毛片| 色在线成人网| 国产男人的电影天堂91| 久久亚洲真实| 欧美色欧美亚洲另类二区| 亚洲天堂国产精品一区在线| 欧美激情国产日韩精品一区| 我的老师免费观看完整版| 午夜a级毛片| 乱人视频在线观看| 久久九九热精品免费| 午夜福利成人在线免费观看| 色综合婷婷激情| 一区福利在线观看| 国产高清有码在线观看视频| 1024手机看黄色片| 亚洲久久久久久中文字幕| 91在线观看av| av在线蜜桃| 色综合亚洲欧美另类图片| 日本爱情动作片www.在线观看 | 亚洲精品久久国产高清桃花| 性欧美人与动物交配| 免费观看精品视频网站| 成年版毛片免费区| 日本与韩国留学比较| 国产一区二区在线av高清观看| 毛片一级片免费看久久久久 | 99精品在免费线老司机午夜| 亚洲色图av天堂| 亚洲精品在线观看二区| 国产欧美日韩精品亚洲av| 欧美xxxx黑人xx丫x性爽| 蜜桃久久精品国产亚洲av| 国产精品1区2区在线观看.| 国产一区二区在线av高清观看| 欧美日韩亚洲国产一区二区在线观看| 欧美日本视频| 我的女老师完整版在线观看| 久久久国产成人精品二区| 亚洲成人免费电影在线观看| 久久精品影院6| 最新在线观看一区二区三区| 亚洲精品一卡2卡三卡4卡5卡| 国产一区二区激情短视频| 欧美另类亚洲清纯唯美| 91久久精品电影网| 欧美在线一区亚洲| 国产av麻豆久久久久久久| ponron亚洲| 俄罗斯特黄特色一大片| 蜜桃久久精品国产亚洲av| 国产爱豆传媒在线观看| 狠狠狠狠99中文字幕| av在线老鸭窝| 自拍偷自拍亚洲精品老妇| 俺也久久电影网| 精品久久久久久久人妻蜜臀av| 男人舔女人下体高潮全视频| 人妻少妇偷人精品九色| 国产激情偷乱视频一区二区| 美女大奶头视频| 亚洲欧美日韩高清专用| 搡老熟女国产l中国老女人| 亚洲一级一片aⅴ在线观看| 少妇人妻精品综合一区二区 | 亚洲国产欧美人成| 美女 人体艺术 gogo| 国产白丝娇喘喷水9色精品| 美女黄网站色视频| 女人被狂操c到高潮| 国产精品一区二区性色av| 亚洲av熟女| 窝窝影院91人妻| 日韩欧美一区二区三区在线观看| 夜夜夜夜夜久久久久| 国产一区二区三区视频了| 久久6这里有精品| 看片在线看免费视频| 国产精品免费一区二区三区在线| 99热这里只有是精品在线观看| 国产一区二区三区视频了| av视频在线观看入口| 亚洲精华国产精华液的使用体验 | 中文字幕高清在线视频| 亚洲精品一卡2卡三卡4卡5卡| 长腿黑丝高跟| 内地一区二区视频在线| 日韩欧美国产一区二区入口| 男插女下体视频免费在线播放| 亚洲欧美日韩东京热| a级毛片免费高清观看在线播放| 欧洲精品卡2卡3卡4卡5卡区| 此物有八面人人有两片| 欧美激情在线99| 免费人成在线观看视频色| av国产免费在线观看| 国产成人影院久久av| 99精品在免费线老司机午夜| 99久久中文字幕三级久久日本| 一级av片app| 色哟哟哟哟哟哟| 亚洲国产精品成人综合色| 韩国av一区二区三区四区| 日本精品一区二区三区蜜桃| 亚洲精品乱码久久久v下载方式| 日本免费一区二区三区高清不卡| 欧美成人一区二区免费高清观看| 真人做人爱边吃奶动态| 自拍偷自拍亚洲精品老妇| 成人性生交大片免费视频hd| 亚洲va日本ⅴa欧美va伊人久久| 搡女人真爽免费视频火全软件 | 日韩中字成人| 午夜免费激情av| 日韩欧美在线乱码| av国产免费在线观看| 亚洲最大成人手机在线| 人人妻人人看人人澡| 亚洲精品成人久久久久久| 97热精品久久久久久| 看片在线看免费视频| 精品久久久久久,| 久久国内精品自在自线图片| 日韩国内少妇激情av| 成年女人永久免费观看视频| 在线播放国产精品三级| www日本黄色视频网| 最近在线观看免费完整版| 久久精品国产亚洲av涩爱 | 国产精品人妻久久久久久| 联通29元200g的流量卡| 亚洲成人免费电影在线观看| 欧美一区二区亚洲| 国产精品野战在线观看| 国产精品一及| 91精品国产九色| 午夜福利高清视频| 美女cb高潮喷水在线观看| 成人高潮视频无遮挡免费网站| 少妇的逼好多水| 国产在视频线在精品| 五月伊人婷婷丁香| bbb黄色大片| 亚洲经典国产精华液单| 国产精品自产拍在线观看55亚洲| 欧美国产日韩亚洲一区| 搡老岳熟女国产| x7x7x7水蜜桃| 身体一侧抽搐| videossex国产| 国产精品国产高清国产av| 日本爱情动作片www.在线观看 | 欧美人与善性xxx| 国国产精品蜜臀av免费| 国产成人a区在线观看| 久久精品国产亚洲av香蕉五月| 国产精品人妻久久久影院| 久久6这里有精品| 女同久久另类99精品国产91| 亚洲欧美清纯卡通| 嫩草影视91久久| 国产精品伦人一区二区| 亚洲美女视频黄频| 亚洲欧美日韩高清在线视频| 亚洲性夜色夜夜综合| 不卡视频在线观看欧美| 99riav亚洲国产免费| 99久久久亚洲精品蜜臀av| 久久久久性生活片| 91av网一区二区| 国产精品永久免费网站| 国产成人福利小说| 老司机深夜福利视频在线观看| 欧美在线一区亚洲| 久久久久久久亚洲中文字幕| 男女边吃奶边做爰视频| 天天一区二区日本电影三级| a在线观看视频网站| 欧美一区二区精品小视频在线| 久久精品国产亚洲网站| 欧美日韩精品成人综合77777| 国产在视频线在精品| 国产黄a三级三级三级人| 亚洲国产日韩欧美精品在线观看| av视频在线观看入口| 全区人妻精品视频| 99热6这里只有精品| 国产 一区精品| 精品人妻一区二区三区麻豆 | a级毛片a级免费在线| 亚洲va日本ⅴa欧美va伊人久久| 欧美xxxx黑人xx丫x性爽| 国产精品一区二区性色av| 麻豆精品久久久久久蜜桃| 日韩精品有码人妻一区| 国产探花在线观看一区二区| 日本免费a在线| 欧美日韩综合久久久久久 | 国产老妇女一区| 久99久视频精品免费| 深夜a级毛片| 天堂影院成人在线观看| 女生性感内裤真人,穿戴方法视频| 成人精品一区二区免费| 在线观看美女被高潮喷水网站| 天天一区二区日本电影三级| 18禁裸乳无遮挡免费网站照片| 日本黄大片高清| 国产美女午夜福利| 精品久久久久久,| 亚洲avbb在线观看| 免费不卡的大黄色大毛片视频在线观看 | АⅤ资源中文在线天堂| 亚洲中文日韩欧美视频| 日本a在线网址| 国产精品1区2区在线观看.| 男插女下体视频免费在线播放| 99久久久亚洲精品蜜臀av| aaaaa片日本免费| av国产免费在线观看| 99久久精品国产国产毛片| 亚洲电影在线观看av| 精品人妻熟女av久视频| 97热精品久久久久久| 免费av不卡在线播放| 午夜精品在线福利| 欧美日本亚洲视频在线播放| 人妻久久中文字幕网| 免费不卡的大黄色大毛片视频在线观看 | 99在线人妻在线中文字幕| 欧美高清成人免费视频www| 99九九线精品视频在线观看视频| 精品福利观看| 美女cb高潮喷水在线观看| 男人舔奶头视频| 午夜福利成人在线免费观看| 婷婷六月久久综合丁香| 亚洲天堂国产精品一区在线| 欧美一区二区国产精品久久精品| 看十八女毛片水多多多| 男人的好看免费观看在线视频| 夜夜看夜夜爽夜夜摸| 亚洲国产色片| 久久精品久久久久久噜噜老黄 | а√天堂www在线а√下载| 免费观看在线日韩| 成人二区视频| 亚洲熟妇中文字幕五十中出| 少妇熟女aⅴ在线视频| 日韩亚洲欧美综合| 3wmmmm亚洲av在线观看| 成人欧美大片| 毛片一级片免费看久久久久 | 国产亚洲精品久久久com| 色在线成人网| 久久久精品大字幕| 两个人视频免费观看高清| 两个人的视频大全免费| 中文字幕免费在线视频6| 国产精品三级大全| 免费av不卡在线播放| 熟女人妻精品中文字幕| 国产主播在线观看一区二区| 美女被艹到高潮喷水动态| 免费人成视频x8x8入口观看| 又粗又爽又猛毛片免费看| 欧美高清性xxxxhd video| a级毛片免费高清观看在线播放| 黄色日韩在线| xxxwww97欧美| 亚洲自偷自拍三级| 国内精品一区二区在线观看| 精品人妻熟女av久视频| 久久婷婷人人爽人人干人人爱| 少妇的逼水好多| 午夜老司机福利剧场| 午夜影院日韩av| 亚洲在线自拍视频| av视频在线观看入口| 国产爱豆传媒在线观看| 久久久久久久久久久丰满 | 可以在线观看毛片的网站| 免费搜索国产男女视频| 国产精品久久久久久亚洲av鲁大| 国产aⅴ精品一区二区三区波| 日韩欧美免费精品| 婷婷精品国产亚洲av在线| 亚洲成人精品中文字幕电影| 国产成人a区在线观看| 两个人视频免费观看高清| 午夜福利高清视频| av黄色大香蕉| 观看美女的网站| 99久久久亚洲精品蜜臀av| 亚洲不卡免费看| 国产精品精品国产色婷婷| 欧美日韩黄片免| 中文字幕免费在线视频6| 国产精品爽爽va在线观看网站| 亚洲成人免费电影在线观看| 国产单亲对白刺激| 欧美+日韩+精品| 成人av在线播放网站| 久久人人精品亚洲av| 女的被弄到高潮叫床怎么办 | 蜜桃久久精品国产亚洲av| 久久这里只有精品中国| 九色国产91popny在线| 久久久久久久久大av| 人妻丰满熟妇av一区二区三区| 有码 亚洲区| 中国美白少妇内射xxxbb| 欧美在线一区亚洲| 成人特级黄色片久久久久久久| 日韩 亚洲 欧美在线| 少妇人妻一区二区三区视频| 高清在线国产一区| 久久精品影院6| 国产午夜精品论理片| 夜夜爽天天搞| 1000部很黄的大片| 欧美3d第一页| 久久久久久伊人网av| 免费一级毛片在线播放高清视频| 少妇裸体淫交视频免费看高清| h日本视频在线播放| 亚洲国产色片| 成人三级黄色视频| 国产综合懂色| 狂野欧美激情性xxxx在线观看| 国产毛片a区久久久久| 男插女下体视频免费在线播放| 国产精品久久久久久亚洲av鲁大|