• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Container Introspection:Using External Management Containers to Monitor Containers in Cloud Computing

    2021-12-15 07:09:52DongyangZhanKaiTanLinYeHainingYuandHaoLiu
    Computers Materials&Continua 2021年12期

    Dongyang Zhan,Kai Tan,Lin Ye,2,Haining Yu,3 and Hao Liu

    1School of Cyberspace Science,Harbin Institute of Technology,Harbin,150001,China

    2Temple University,Philadelphia,19122,USA

    3City University of Hong Kong,Kowloon Tong,518057,Hong Kong

    4Qianxin Technology Group Co.,Ltd.,Beijing,100000,China

    Abstract: Cloud computing plays an important role in today’s Internet environment,which meets the requirements of scalability,security and reliability by using virtualization technologies.Container technology is one of the two mainstream virtualization solutions.Its lightweight, high deployment efficiency make container technology widely used in large-scale cloud computing.While container technology has created huge benefits for cloud service providers and tenants,it cannot meet the requirements of security monitoring and management from a tenant perspective.Currently, tenants can only run their security monitors in the target container,but it is not secure because the attacker is able to detect and compromise the security monitor.In this paper,a secure external monitoring approach is proposed to monitor target containers in another management container.The management container is transparent for target containers, but it can obtain the executing information of target containers, providing a secure monitoring environment.Security monitors running inside management containers are secure for the cloud host, since the management containers are not privileged.We implement the transparent external management containers by performing the one-way isolation of processes and files.For process one-way isolation,we leverage Linux namespace technology to let management container become the parent of target containers.By mounting the file system of target container to that of the management container,file system one-way isolation is achieved.Compared with the existing host-based monitoring approach,our approach is more secure and suitable in the cloud environment.

    Keywords: Container introspection; management container; external approach;one-way isolation

    1 Introduction

    Cloud computing is one of the most important computing infrastructures, which is necessary for the development of the Internet of things and big data.There are many popular cloud service providers (e.g., Amazon, Microsoft, Google) hosting the applications of lots of developers or companies.Cloud computing is based on virtualization technology, which can divide huge physical resources into many small virtual resources.There are two mainstream virtualization technologies,including virtual machine and container.Each virtual machine has its own operating system kernel, making it heavyweight and less efficient in deployment.Compared with virtual machines,containers are lightweight and more efficient in deployment, because they share the operating system kernel with the host.Therefore, it is more popular.

    The widespread development of cloud computing and containers has also brought security risks.In a cloud computing environment with multi-tenant tenants, tenants need to monitor and manage their container instances.However, the current host-based or container-based monitoring methods cannot meet the requirements of security and flexibility in cloud computing.Firstly,container-based monitors running inside target containers can be detected or subverted by incontainer attackers, since they are running in the same namespace.Although monitors can be executed in the host to hide themselves, it is not secure in the cloud since host applications are privileged for all containers.Secondly, redirecting execution information of target containers to security monitors of cloud tenants is not flexible, because it needs the close cooperation of the cloud host.It is not practicable for cloud service providers to corporate with each cloud tenant.

    In this paper, an external container monitoring architecture is proposed to solve these problems.In this architecture, monitoring tools of cloud tenants or CSPs are deployed in external management containers, which can intercept the execution information of target containers but are transparent to them.The external container provides a secure and flexible monitoring environment for security tools.Security tools running inside the management containers are transparent and isolated to target containers.Since the management container is unprivileged, in-container security tools cannot affect host security.So, cloud tenants can run security tools as they want.After providing a one-way transparent monitoring environment, CSP needs not to closely cooperate with different security tools of cloud tenants.Therefore, our architecture is more secure and flexible compared with existing host-based or container-based security monitoring approaches.

    To achieve one-way transparent management containers, process and file one-way isolation approaches are proposed.For process isolation, we leverage Linux namespace technology to make management container become the parent of target containers.Since parent namespace has full privilege over child namespace, security tools running in management container can intercept the execution information of target containers, and are transparent to them.We do not leverage the container-in-container solution to achieve one-way isolation, because it needs the parent container to be privileged.For file isolation, we mount the file system of the target container to that of the management container.Therefore, security tools can access files of target containers transparently.After the implementation, we test the effectiveness and performance of our prototype.The experimental results show that our system can make security tools be transparent to target containers with high performance.

    In summary, the contributions of this paper are as follows.

    ? An external container monitoring approach is proposed to build management containers over target containers.Security tools running inside management containers are transparent to target containers, but can intercept the execution information of them.

    ? A namespace-based process isolation approach is proposed by making the namespace of the management container to be the parent of target containers and ensuring the access security of the management container.

    ? For file isolation, a file-system-based file introspection method is used for the management containers to access the files of target containers outside.

    The rest of this paper is organized as follows.Section 2 gives the related work.The system design is described in Section 3.The design details about process introspection and file system introspection are given in Section 4 and Section 5 respectively.Section 6 evaluates the effectiveness and performance of the prototype.Section 7 concludes this paper and discusses the future work.

    2 Related Work

    At present, container introspection technology is still a new research topic, and this concept is related with cloud security, virtual machine introspection and container security technologies [1,2].

    2.1 Virtual Machine Introspection

    The current research direction closest to the container introspection technology is virtual machine introspection (VMI) [3], which monitors VMs from the hypervisor.The hypervisor has the highest privilege and can intercept the execution information of target VMS.Under the framework of VMI, the monitoring of the VMs generally includes three steps:execution information collection, semantic reconstruction, and behavior analysis.

    There are two approaches to collect VM information, including static analysis and dynamic interception.CFMT [4] obtains the contents of the VM disk from the outside and saves the checksums of all the original file contents in the VM files.Then it compares the checksum of the existing contents with the original one during each poll to detect whether there the file has been tampered with.VMWatcher [5] maps the file systems of a VM to the privileged virtual machine(DOM0), and uses anti-virus software to perform security analysis on these files to protect the security of the VM.

    Compared with static approaches, dynamic approaches can obtain the execution information in real time.Ether [6] can capture the behavior of virtual machine system calls in real time.The system modifies the content of a specific register (MSR register) of the target VM.When the VM executes a system call, it throws an exception, which can trigger an event in the hypervisor.At this time, Ether can obtain specific information about the system call, such as call number and parameters.Nitro [7] is similar to Ether, but Ether is designed for the Xen platform and Nitro works in KVM platform.

    The execution information collected in the VMM layer is binary low-level information, but security analysis needs high-level information.After collection, it needs to be reconstructed into high-level semantic information.Filesafe [8] reconstructs file system from disk image based on the layout of Windows FAT32 file system and then maps files and disk blocks.vMon [9] reconstructs the map between file and disk block for Linux VM.Volatility is an open-source memory analysis tool, which can reconstruct kernel objects from binary memory snapshot based on the profiles of layouts of different operating systems.Reference [10] can identify the kernel version by analyzing the VM kernel automatically.

    VMI-based security tools are usually applied for cloud security [11–13], such as Cloud-VMI [14], SECLOUD [15] and ESI-Cloud [16].

    2.2 Container Security

    Container security [17] is a hot topic, so there are many works to analyze and protect container security.Reference [18] compares virtual machines and containers.Compared to virtual machine technology, containers are more light-weight and can reduce the resource consumption,because containers share the operating system of the host.But it also raises security risks due to the huge attack surface of the operating system.In addition, the ecosystem of the Docker containers also contains security challenges, this paper also focuses the security of it.

    SCONE [19] leverages Intel SGX technology to protect the Docker containers from external malicious attacks and the untrusted cloud hosts.To defense against container escalation attacks,Reference [20] proposes an escape defense method by checking the status of Linux Namespace,which can detect abnormal processes and prevent users from malicious escaping behaviors.Reference [21] focuses on strengthening the Docker’s access restriction, and hopes to extend the dockerfile format so that the Docker image maintainer can provide the SELinux security policies to enhance the security of the container.SELinux is widely used to enhance the security of certain service programs, the expansion and adjustment of dockerfile will allow SELinux security policies to be specified for different images, improving the security of Docker.Reference [22] exploits the Linux cgroups from containers and proves that cgroups technology is not enough to limit the resource access of containers in cloud computing.

    2.3 Container Introspection Technology

    To analyze the security of containers, Reference [23] uses the introspection tool Prometheus to capture the information including the Docker engine itself and the memory usage of the container and the host OS.This method analyzes the data difference between the Apache server running in the container during normal operation and when it is infected by malware, and concludes that introspection tools can be used as data collection and forensic analysis tools for the early warning system in the containerized system.Reference [24] proposes a malicious node identification method.

    In summary, there has not been much research on the concept of container introspection technology.This paper is a preliminary exploration of this concept.

    3 Design of Container Introspection

    This section describes the design overview of our system.We first give the motivation and then describe the threat model and assumption.After that, two one-way isolation approaches for process and file system are proposed.

    3.1 Motivation

    With the development and wide application of container technology, more and more containers are deployed in cloud computing.Containers are facing increasing security risks since they are providing services on the Internet.Therefore, many cloud tenants and cloud service providers need to manage and monitor their containers.There are several security and flexibility requirements of container monitoring, which are as follows.

    RQ1:Monitoring tools should be secure.Many containers execute processes with root privilege by default.It is not secure for monitors running inside them.Even though container processes are not privileged, they can also detect monitoring tools, which is not secure for monitoring tools.

    RQ2:Security tools should be isolated from the host.Processes running inside containers can be accessed in the host, but it is not secure to run security tools of cloud tenants in the host in cloud computing.

    RQ3:Cloud service providers should not closely cooperate with security tools.Another monitoring solution in the context of virtual machines is that the host intercepts execution information of the target VM and then sends it to the security tools running inside another secure VM.In the context of containers, it is possible for CSP to transmit the execution information of target containers to a secure container.However, this solution needs the close cooperation of CSPs.CSPs need to provide the customized monitoring APIs or required information for different monitors.It is very complicated for CSPs to perform API authorization and access control, since there are many containers of different cloud tenants running on the host.

    To meet these requirements, this paper proposes an external approach for container introspection, which builds a one-way isolated management container over target containers.The management container is a secure and flexible environment for monitoring tools.

    3.2 Threat Model&Assumptions

    Before describing the design of our system, we first discuss the threat model and some assumptions.

    We first assume that containers cannot escape to the cloud host.Container privilege escalation is a serious attack for cloud computing and security researchers are keeping fix vulnerabilities in the host kernel.But currently there no perfect host-based solution to defense container privilege escalation.Therefore, we do not consider container escape attack in this paper.

    In addition, the CSPs are considered to be trusted, which is a common trust base in cloud computing.Most security monitors in cloud computing rely on the isolation provided by cloud hosts or hypervisors.The design of our system is also based on the security protection of cloud hosts.

    Cloud tenants are responsible for the security of their security monitors.In this paper, we do not analyze the security of monitoring tools from cloud tenants and do not provide mechanisms for cloud tenants to intercept their security monitors.

    3.3 System Overview

    The core method of our system is to build a one-way isolation management container, which can intercept the execution information of target containers but is transparent to them.The architecture of our system is shown in Fig.1.

    Figure 1:The system architecture of container introspection

    The host provides OS virtualization service for containers, which has the highest privilege and isolates different containers.There are two modules in the system, building the one-way isolation environment for management containers.The PID NS management module makes the PID namespace of the management container be the parent of target containers by leveraging the host namespace mechanism.After that, the management container can intercept the process information of the target containers without the cooperation of the host.File system management module analyzes the structure of target containers and mounts them to the management container.Security tools of cloud tenants run in the management container, so that they can access the execution information of target containers.There can be many target containers managed by only one management container.

    4 Namespace-based Process Introspection

    We leverage the Linux namespace mechanism to achieve one-way process isolation.The main steps include:1) constructing a parent PID namespace of target containers; 2) letting the management container join the parent namespace dynamically; 3) hiding other processes of the parent PID namespace.At first, we make a brief introduction of Linux namespaces.

    4.1 Linux PID Namespace

    There are 6 different namespaces introduced by the Linux kernel after v2.6.These namespaces are used to isolate different kinds of resources for containers, including PID namespace, UTS namespace, IPC namespace, MNT namespace, NET namespace and USER namespace.Among them, the PID namespace is used for process domain isolation.The relationship between different PID namespaces is shown in Fig.2.Only processes within the same PID namespace could see each other.The parent PID namespace has full privilege over child namespaces.Processes of child namespace are mapped into parent namespace.For instance, Process 1 of Namespace 1 is mapped as Process 5 in Namespace 0, so all of the processes in Namespace 0 are able to see it.For the Docker container, a new namespace is automatically created when the container is created.All processes running inside one container belong to the same PID namespace, so they can see each other.Since different containers have different PID namespaces, processes of different containers can see each other.

    Inspired by the PID namespace, we found that if the PID namespace of the management container is that of the target container, the management container can visit the processes of the target container transparently.

    4.2 Docker-in-docker Architecture

    There are several docker-in-docker solutions (e.g., dind), which make the docker create a new docker inside it.A child namespace can also be the parent of other namespaces.Based on this mechanism, running a docker in another docker is possible.But most dockers cannot create child dockers, because there are several challenges First, the parent docker should be privileged.However, privileged dockers are not safe and not accepted in cloud computing.Second, the file system of Docker (AUFS) should only consist of normal file systems, which means docker cannot run based on multiple AUFS file systems.These challenges are shortcomings of dind.So, dind should be created by Docker with ‘privileged’flag, and the file system of child docker should be a volume of the parent docker.

    Figure 2:The relationship between different namespaces

    Even though docker-in-docker solutions can build multiple levels of namespaces and make external monitoring possible, the security risks of privileged containers are unacceptable in cloud computing.Therefore, our approach leverages the architecture of the docker-in-docker solution and tries to overcome the problems of it.

    4.3 Joining into Parent Namespace

    To address the problems of the docker-in-docker solution, our system is based on the dockerin-docker solution but does not execute security monitors directly in the parent docker.The main approach is to let the target containers run inside a parent container, and then let management container join the PID namespace of the parent docker.The steps are as follows.

    1) Creating a parent container.When a cloud tenant creates her first container, the host first creates a parent container.This container can create child containers, so it is created with the ‘privileged’flag.But this step is transparent to the cloud tenants, and the tenants cannot operate the parent container.

    2) Creating target containers.Target containers are created within the parent container, so the PID namespace of the parent container is the parent of those of target containers.Parent container has the client which can create child containers for cloud tenant.Only containers of the same cloud tenant can be created in one parent container.

    3) Creating the management container.Management container is the execution environment of security monitors.To access the information of target containers, we let it join the PID namespace of the parent container, when it is created.Since this container only shares the same PID namespace of the parent container, it is not as privileged as the parent container.Therefore, it is more secure.

    4.4 Process Hiding

    Since the management container shares the same PID namespace of the parent container, the management container can obtain the process information of client tools of the parent container,making the parent container be visible.To overcome this problem, we leverage a kernel module to hide the client in the parent container.

    The process hiding approach is inspired by kernel rootkits.Kernel rootkits are used to hide processes or files in operating systems.They usually hook kernel functions and inject malicious code in kernel system calls.Among them, adore-ng is a popular rootkit, which is used for process and file hiding.It injects malicious code into several system calls (e.g., gedents64, etc.).The injected code deletes the process that needed to be hidden from the result list.

    Our process hiding module is also based on the idea of kernel rootkit, hooking some key kernel functions and injecting code into several system calls (e.g., getdents).The difference is the module only hides the process information of the client from the management container.Since the management container and parent container share the same PID namespace, we hide the client process in the parent container from other processes within this namespace.Therefore, the most important step is to identify the processes of different namespaces.

    To address this challenge, we first explore the relationship between processes and namespaces.In Linux, all task structures are linked by a doubly linked list, which first task is labeled with the ‘init_task’symbol.As shown in Fig.3, every task structure has a nsproxy object to record its different namespaces.The pid_ns fields of different tasks in a same container point to only one PID namespace object, so we can identify all the processes of a container in the kernel by identifying the pid_ns pointer of its task structure.

    Figure 3:Relationship between process structure and namespace

    When a parent container is created, the corresponding PID namespace is identified.Then, the pid of client in the parent container is obtained.After that, the namespace and pid are transferred to the kernel module via a customized system call.The kernel module reads the information and performs process hiding.If a process of parent container wants to obtain the process list by using ps command, the result of the system call is checked and the information of the client is cleared.

    5 File System Introspection

    The file system introspection is based on the AUFS file system, which is widely used by the Docker containers.So, we first make a brief introduction of AUFS, and then describe how we leverage AUFS to perform external file system introspection.

    AUFS (short for advanced multi-layered unification file system) is an implementation of the Union File System, which can merge file directories stored in different locations and mount them to the same directory.As shown in Fig.4, the file system is copy-on-write.There are several layers in the file system of a docker.The lower layers are image layers, which are read-only.Therefore,these layers can be used for many dockers at the same time.The upper layer is writable, which records the modifications to the underlying images.When files are added, deleted, and modified in the container, a runtime copy will be generated in the upper layer.All the layers are mounted to the same directory with a number, which is not the ID of the container.So, we need to find the correspondence between this number and the container ID.

    Based on the features of AUFS, we achieve the one-way file system isolation by mounting the mount point of the target container in the host to a subdirectory of the management container and analyzing the mapping between container ID and mount ID automatically, which is shown in Fig.4.In addition, when the target containers are going to be removed, the file system of it should be unmounted from the management container first, to prevent the failure of container removal.

    Figure 4:File system introspection

    6 Evaluation

    This section evaluates the effectiveness and performance of our system.The testbed is a PC equipped with 3.2 GHz Intel i5 CPU and 8 GB RAM.The host operating system is Ubuntu 16.04.Dind is selected as the image of the parent container.The image of the target container is Ubuntu 14.04.

    6.1 Effectiveness

    Our system can obtain the process information and files of the target container from the management container, so the first step is to deploy the monitoring tools in the management container after deploying the target container.We test the effectiveness of process introspection and file system introspection respectively.

    To test the effectiveness of process introspection, we first introduce a workload in the target container and then run the ‘ps’command in management to obtain the process list of the target container.The target container is running the ps command, and the management container is able to get the corresponding process information.Then, we run the ping command in the management container, and run the ps command in the target container.The results show that the processes of the management container are transparent to the target container.

    We obtain the file list of the target container in the management container to test the effectiveness of file introspection.As shown in Fig.5, we first add a new file in the target container, then get the file list in the management container in Fig.6.From the result, we can know that the management container is able to access the file system of target containers.

    Figure 5:Adding a file in the target container

    Figure 6:Accessing files from the parent container

    6.2 Performance

    Since our system introduces a parent container to user containers, the parent container will consume file space.Therefore, we measure the size of the dind image, which is 533 MB.According to the results, the space cost is acceptable for cloud computing.

    There is a kernel module to hide the client processes in parent containers, which could introduce overhead to the ‘ps’command.So, we test the execution time before and after the injection of the kernel module for 1000 times, and then compare the performance.The average execution time of ‘ps’before module injection is about 23.05 ms, and it is 23.2 ms after injection.The experimental results show that the overhead is acceptable since the ‘ps’operation is not time-sensitive.

    7 Conclusion&Future Work

    This paper proposes an external container introspection approach to monitor target containers from a management container, which is built by achieving a one-way transparent process and file isolation.Based on Linux namespaces, the namespace of the management container is the parent of target containers, so security tools running inside the management container can obtain the execution information of the target containers.For file system introspection, we analyze and mount the file system of target container to the management container.After the implementation,

    we test the prototype.The experimental results show that our system is effective with acceptable overhead.In this paper, we do not analyze cross-host containers of one cloud tenant.Containers belonging to one cloud tenant may be deployed in different physical cloud hosts, but our system can only analyze containers in one host.To analyze cross-host containers of one cloud tenant,we need to correlate and analyze different cloud hosts.This work is left to future work.

    Funding Statement:This paper is supported by National Natural Science Foundation of China(http://www.nsfc.gov.cn/) under Grant No.61872111, and Sichuan Science and Technology Program (http://kjt.sc.gov.cn/) under Grant No.2019YFSY0049 which are both received by L.Ye.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    99久久成人亚洲精品观看| 精品不卡国产一区二区三区| 亚洲自拍偷在线| 女生性感内裤真人,穿戴方法视频| 别揉我奶头~嗯~啊~动态视频| 成人亚洲精品av一区二区| 少妇的逼水好多| 全区人妻精品视频| 国产精品久久久人人做人人爽| 亚洲av熟女| 国产成人一区二区三区免费视频网站| 午夜精品一区二区三区免费看| 久久国产精品影院| 国产蜜桃级精品一区二区三区| 国产黄色小视频在线观看| 毛片女人毛片| 校园春色视频在线观看| 在线十欧美十亚洲十日本专区| 日韩欧美国产一区二区入口| 一进一出好大好爽视频| 黄频高清免费视频| 亚洲色图 男人天堂 中文字幕| 欧洲精品卡2卡3卡4卡5卡区| 老司机在亚洲福利影院| 午夜影院日韩av| 久久久久久久午夜电影| 国产精品美女特级片免费视频播放器 | 熟妇人妻久久中文字幕3abv| 久久久国产欧美日韩av| 一个人免费在线观看的高清视频| 三级毛片av免费| 99热精品在线国产| 国产高潮美女av| 欧美黑人欧美精品刺激| 国产精华一区二区三区| 亚洲av成人精品一区久久| 久久国产精品影院| 久久中文看片网| 久久天躁狠狠躁夜夜2o2o| 美女扒开内裤让男人捅视频| 网址你懂的国产日韩在线| 美女免费视频网站| 欧美在线一区亚洲| 欧洲精品卡2卡3卡4卡5卡区| 小说图片视频综合网站| 国产精品av视频在线免费观看| 日本a在线网址| 成年免费大片在线观看| 国产亚洲精品一区二区www| 日本五十路高清| or卡值多少钱| 美女高潮的动态| 国产亚洲精品av在线| 亚洲 国产 在线| 床上黄色一级片| 欧美色视频一区免费| 99热这里只有是精品50| 999精品在线视频| 深夜精品福利| 麻豆成人午夜福利视频| 国产激情偷乱视频一区二区| 成人国产一区最新在线观看| 九九热线精品视视频播放| 国产成人av教育| 亚洲av中文字字幕乱码综合| 婷婷精品国产亚洲av在线| 午夜福利免费观看在线| 久久久国产成人精品二区| 一本综合久久免费| 99re在线观看精品视频| 嫩草影院入口| 制服人妻中文乱码| 亚洲成人免费电影在线观看| 日本精品一区二区三区蜜桃| 成人性生交大片免费视频hd| 美女被艹到高潮喷水动态| 午夜视频精品福利| 19禁男女啪啪无遮挡网站| 一级作爱视频免费观看| 99精品在免费线老司机午夜| av天堂在线播放| av在线天堂中文字幕| 色视频www国产| 国产伦在线观看视频一区| 日韩欧美精品v在线| 国产黄色小视频在线观看| 精品日产1卡2卡| 国产精品国产高清国产av| av欧美777| 欧美黑人巨大hd| svipshipincom国产片| 免费av不卡在线播放| 国产91精品成人一区二区三区| 男人的好看免费观看在线视频| 午夜久久久久精精品| 国产亚洲精品久久久久久毛片| 宅男免费午夜| 麻豆国产av国片精品| 99久久精品一区二区三区| 97碰自拍视频| 亚洲七黄色美女视频| 成人三级做爰电影| 黑人巨大精品欧美一区二区mp4| 日韩欧美三级三区| 中文字幕精品亚洲无线码一区| 欧美高清成人免费视频www| 亚洲专区中文字幕在线| 少妇裸体淫交视频免费看高清| 一卡2卡三卡四卡精品乱码亚洲| 免费无遮挡裸体视频| 婷婷六月久久综合丁香| 精品一区二区三区视频在线 | 精品电影一区二区在线| 免费大片18禁| 成人18禁在线播放| 免费在线观看影片大全网站| 极品教师在线免费播放| 国产精品久久电影中文字幕| 亚洲国产高清在线一区二区三| 亚洲精品美女久久av网站| 国产成人aa在线观看| 亚洲午夜理论影院| 国内揄拍国产精品人妻在线| 18禁裸乳无遮挡免费网站照片| 99热这里只有是精品50| 男女午夜视频在线观看| 两个人视频免费观看高清| 国内久久婷婷六月综合欲色啪| 亚洲熟女毛片儿| 一二三四社区在线视频社区8| bbb黄色大片| 香蕉久久夜色| 日韩欧美一区二区三区在线观看| 亚洲欧美日韩高清专用| 日韩欧美在线乱码| 少妇人妻一区二区三区视频| 欧美在线一区亚洲| 啦啦啦观看免费观看视频高清| 18禁观看日本| 精品一区二区三区视频在线 | 亚洲专区中文字幕在线| 亚洲七黄色美女视频| 高清在线国产一区| 国产精品综合久久久久久久免费| 精品免费久久久久久久清纯| 最新美女视频免费是黄的| 每晚都被弄得嗷嗷叫到高潮| 制服丝袜大香蕉在线| 成人亚洲精品av一区二区| 99视频精品全部免费 在线 | 不卡av一区二区三区| av欧美777| 香蕉国产在线看| 人人妻人人看人人澡| 91av网一区二区| 在线观看午夜福利视频| 中文字幕高清在线视频| 美女大奶头视频| 51午夜福利影视在线观看| svipshipincom国产片| 亚洲一区二区三区色噜噜| 亚洲狠狠婷婷综合久久图片| 久久久久精品国产欧美久久久| 麻豆久久精品国产亚洲av| 精品久久久久久久毛片微露脸| 91麻豆av在线| 老汉色∧v一级毛片| 最近视频中文字幕2019在线8| 亚洲欧美精品综合久久99| 三级男女做爰猛烈吃奶摸视频| 亚洲av成人av| 91麻豆av在线| 久久久久久九九精品二区国产| 少妇裸体淫交视频免费看高清| 伦理电影免费视频| 大型黄色视频在线免费观看| 一个人观看的视频www高清免费观看 | 夜夜看夜夜爽夜夜摸| 色综合站精品国产| 日本三级黄在线观看| 三级国产精品欧美在线观看 | 又紧又爽又黄一区二区| 国产精品爽爽va在线观看网站| 欧美成人免费av一区二区三区| 亚洲成人免费电影在线观看| 一个人免费在线观看电影 | 90打野战视频偷拍视频| 国产精品久久电影中文字幕| 亚洲av成人不卡在线观看播放网| 欧美激情在线99| 人妻丰满熟妇av一区二区三区| 2021天堂中文幕一二区在线观| 亚洲国产欧美一区二区综合| 看黄色毛片网站| 国产不卡一卡二| 给我免费播放毛片高清在线观看| 超碰成人久久| 国产三级黄色录像| 法律面前人人平等表现在哪些方面| 亚洲一区二区三区色噜噜| 在线观看美女被高潮喷水网站 | 国产亚洲精品久久久com| 小蜜桃在线观看免费完整版高清| 欧美在线黄色| 在线免费观看不下载黄p国产 | tocl精华| 一本综合久久免费| 亚洲熟妇熟女久久| 国产成人啪精品午夜网站| 成人av一区二区三区在线看| 亚洲国产精品成人综合色| 精品国产乱子伦一区二区三区| av中文乱码字幕在线| 中亚洲国语对白在线视频| 欧美最黄视频在线播放免费| 久久婷婷人人爽人人干人人爱| 女警被强在线播放| 老司机深夜福利视频在线观看| 亚洲,欧美精品.| 99久久精品国产亚洲精品| 国产亚洲av高清不卡| a级毛片a级免费在线| 午夜福利成人在线免费观看| 999久久久国产精品视频| 99久久无色码亚洲精品果冻| 久久精品国产综合久久久| 国产精品久久久人人做人人爽| 国内精品久久久久久久电影| 亚洲熟女毛片儿| 免费看美女性在线毛片视频| 免费在线观看日本一区| 亚洲美女视频黄频| 久久精品国产99精品国产亚洲性色| 成人特级黄色片久久久久久久| 国产精品av久久久久免费| 中文在线观看免费www的网站| 最好的美女福利视频网| 午夜精品在线福利| 婷婷精品国产亚洲av| 国产精品爽爽va在线观看网站| www.熟女人妻精品国产| 亚洲国产精品sss在线观看| 欧美成狂野欧美在线观看| 日韩国内少妇激情av| 欧美黑人欧美精品刺激| 成人亚洲精品av一区二区| 91字幕亚洲| 欧美xxxx黑人xx丫x性爽| 99久久99久久久精品蜜桃| 亚洲激情在线av| 美女高潮的动态| 麻豆久久精品国产亚洲av| 69av精品久久久久久| 窝窝影院91人妻| 一区福利在线观看| 日本撒尿小便嘘嘘汇集6| 亚洲人成网站在线播放欧美日韩| 18禁美女被吸乳视频| 啦啦啦观看免费观看视频高清| 国产精品香港三级国产av潘金莲| 色视频www国产| 麻豆久久精品国产亚洲av| 男女视频在线观看网站免费| 亚洲欧美日韩东京热| 哪里可以看免费的av片| 国产又黄又爽又无遮挡在线| avwww免费| 两人在一起打扑克的视频| 三级国产精品欧美在线观看 | 999精品在线视频| 国产精品久久久久久人妻精品电影| 少妇的逼水好多| 丰满人妻一区二区三区视频av | 观看免费一级毛片| 亚洲国产看品久久| x7x7x7水蜜桃| 999久久久国产精品视频| 国产成人影院久久av| 日韩国内少妇激情av| 欧美一区二区国产精品久久精品| 真实男女啪啪啪动态图| 久久久成人免费电影| 美女高潮的动态| 午夜视频精品福利| 久9热在线精品视频| 一二三四在线观看免费中文在| 观看美女的网站| 免费一级毛片在线播放高清视频| 国产av不卡久久| 成人18禁在线播放| 一区福利在线观看| 色av中文字幕| 精品久久久久久久毛片微露脸| xxx96com| 宅男免费午夜| 欧美大码av| 99re在线观看精品视频| 99久国产av精品| 成人国产一区最新在线观看| 可以在线观看的亚洲视频| 亚洲熟女毛片儿| 免费搜索国产男女视频| 激情在线观看视频在线高清| 日本a在线网址| 欧美日本视频| or卡值多少钱| 9191精品国产免费久久| 视频区欧美日本亚洲| 亚洲在线自拍视频| 国产精品免费一区二区三区在线| 欧洲精品卡2卡3卡4卡5卡区| 久久这里只有精品中国| 国产久久久一区二区三区| 少妇人妻一区二区三区视频| www国产在线视频色| 成人国产一区最新在线观看| 无人区码免费观看不卡| 18禁观看日本| 99久久国产精品久久久| 999久久久国产精品视频| 中国美女看黄片| 亚洲专区字幕在线| 久久中文字幕一级| 欧美乱色亚洲激情| 日韩欧美免费精品| 香蕉久久夜色| 一个人免费在线观看电影 | 精品久久久久久久末码| 国产精品一区二区精品视频观看| 最近最新免费中文字幕在线| av福利片在线观看| a级毛片在线看网站| 免费看光身美女| 日韩欧美免费精品| 日韩国内少妇激情av| 极品教师在线免费播放| 成人永久免费在线观看视频| 搡老妇女老女人老熟妇| 一个人看视频在线观看www免费 | 校园春色视频在线观看| 国内揄拍国产精品人妻在线| 色尼玛亚洲综合影院| 啦啦啦免费观看视频1| 国产97色在线日韩免费| 村上凉子中文字幕在线| 久久草成人影院| 日韩欧美精品v在线| 日本黄色片子视频| 国产精品久久久av美女十八| 欧美一级毛片孕妇| 啦啦啦免费观看视频1| 少妇的丰满在线观看| 国产三级在线视频| 国产69精品久久久久777片 | 国产综合懂色| 99精品欧美一区二区三区四区| 国产人伦9x9x在线观看| 色吧在线观看| 夜夜躁狠狠躁天天躁| 97超视频在线观看视频| 精品一区二区三区av网在线观看| АⅤ资源中文在线天堂| 天堂av国产一区二区熟女人妻| 国产一区二区在线av高清观看| 一级毛片女人18水好多| 久久久水蜜桃国产精品网| 精品国内亚洲2022精品成人| 国产成人福利小说| 99国产精品99久久久久| 中文字幕熟女人妻在线| 熟妇人妻久久中文字幕3abv| 69av精品久久久久久| 婷婷亚洲欧美| 亚洲aⅴ乱码一区二区在线播放| 国产毛片a区久久久久| 亚洲av熟女| 婷婷亚洲欧美| 在线观看午夜福利视频| 日本黄大片高清| 青草久久国产| 日韩免费av在线播放| 亚洲人与动物交配视频| 国产三级在线视频| 成熟少妇高潮喷水视频| 国产伦精品一区二区三区视频9 | 午夜日韩欧美国产| 90打野战视频偷拍视频| 熟妇人妻久久中文字幕3abv| 日韩av在线大香蕉| 99视频精品全部免费 在线 | 91av网一区二区| 精品午夜福利视频在线观看一区| av欧美777| 亚洲第一电影网av| 黄片小视频在线播放| xxx96com| 久久久久久国产a免费观看| 小蜜桃在线观看免费完整版高清| 91av网站免费观看| 成年版毛片免费区| 久久久久九九精品影院| 久久久久久人人人人人| av片东京热男人的天堂| 亚洲成人中文字幕在线播放| www.熟女人妻精品国产| 国产精品一区二区三区四区久久| 一区二区三区国产精品乱码| 国内毛片毛片毛片毛片毛片| 亚洲国产精品合色在线| 日韩高清综合在线| 三级国产精品欧美在线观看 | 一a级毛片在线观看| 成熟少妇高潮喷水视频| 91麻豆精品激情在线观看国产| 两个人看的免费小视频| 变态另类丝袜制服| 天堂av国产一区二区熟女人妻| 中文字幕熟女人妻在线| 亚洲国产精品合色在线| 性色avwww在线观看| 国内精品美女久久久久久| 亚洲成人久久爱视频| 欧美又色又爽又黄视频| 国产单亲对白刺激| 在线永久观看黄色视频| 亚洲在线观看片| 亚洲中文av在线| 中文资源天堂在线| av视频在线观看入口| h日本视频在线播放| 在线观看午夜福利视频| 一进一出抽搐gif免费好疼| bbb黄色大片| 村上凉子中文字幕在线| 日本在线视频免费播放| 亚洲18禁久久av| 美女被艹到高潮喷水动态| 噜噜噜噜噜久久久久久91| 国产伦一二天堂av在线观看| 99久久无色码亚洲精品果冻| 欧美日韩黄片免| 欧美日韩福利视频一区二区| 2021天堂中文幕一二区在线观| 欧美成人免费av一区二区三区| 国产蜜桃级精品一区二区三区| 国产在线精品亚洲第一网站| 激情在线观看视频在线高清| 一边摸一边抽搐一进一小说| 1000部很黄的大片| 在线看三级毛片| 搡老岳熟女国产| 国产av一区在线观看免费| 国产高清视频在线观看网站| 99国产精品99久久久久| 亚洲av熟女| 午夜两性在线视频| 国产成人一区二区三区免费视频网站| 啦啦啦免费观看视频1| av黄色大香蕉| 国产一区二区在线av高清观看| 国产熟女xx| 亚洲欧美日韩卡通动漫| 全区人妻精品视频| 精品一区二区三区四区五区乱码| 国产精品香港三级国产av潘金莲| 国产成人av激情在线播放| 淫秽高清视频在线观看| 国产精品国产高清国产av| 嫁个100分男人电影在线观看| 精品电影一区二区在线| 欧美成人免费av一区二区三区| 久久天堂一区二区三区四区| 精品久久久久久久人妻蜜臀av| 男女之事视频高清在线观看| 亚洲中文字幕日韩| 国产成人一区二区三区免费视频网站| 一a级毛片在线观看| 亚洲av成人精品一区久久| 亚洲av电影在线进入| 亚洲欧美日韩东京热| 高清毛片免费观看视频网站| 日韩欧美国产一区二区入口| 午夜成年电影在线免费观看| 19禁男女啪啪无遮挡网站| 亚洲自偷自拍图片 自拍| 天天躁日日操中文字幕| 999精品在线视频| 成年免费大片在线观看| 1024香蕉在线观看| 国产成人精品久久二区二区免费| 一个人观看的视频www高清免费观看 | 国产成人福利小说| 亚洲欧美日韩东京热| 日本一二三区视频观看| 久久久久亚洲av毛片大全| 色av中文字幕| 天堂√8在线中文| 国产免费男女视频| 国产亚洲av嫩草精品影院| 人人妻,人人澡人人爽秒播| 人妻久久中文字幕网| 亚洲国产欧洲综合997久久,| 国产午夜精品论理片| 欧美成人性av电影在线观看| 老汉色∧v一级毛片| 久久久国产成人精品二区| 宅男免费午夜| 久久久久免费精品人妻一区二区| 又大又爽又粗| 亚洲av成人不卡在线观看播放网| 久久伊人香网站| 女生性感内裤真人,穿戴方法视频| 成人高潮视频无遮挡免费网站| 午夜免费激情av| 欧美+亚洲+日韩+国产| 99热这里只有精品一区 | 久久午夜综合久久蜜桃| 成在线人永久免费视频| 熟女电影av网| 在线看三级毛片| 国产欧美日韩一区二区三| 看黄色毛片网站| 亚洲精华国产精华精| 好男人电影高清在线观看| 欧美极品一区二区三区四区| 1024香蕉在线观看| 香蕉久久夜色| 给我免费播放毛片高清在线观看| 日韩成人在线观看一区二区三区| 国产精品一区二区免费欧美| 国产伦人伦偷精品视频| 欧美三级亚洲精品| 少妇的丰满在线观看| 中文字幕人妻丝袜一区二区| 又黄又粗又硬又大视频| 一本一本综合久久| 啦啦啦免费观看视频1| 日韩大尺度精品在线看网址| 搡老妇女老女人老熟妇| 人妻夜夜爽99麻豆av| 精品日产1卡2卡| 国产黄a三级三级三级人| 成人国产综合亚洲| 一进一出抽搐动态| 久久精品国产亚洲av香蕉五月| 99久久精品一区二区三区| 亚洲黑人精品在线| 嫩草影视91久久| 精品久久久久久久久久久久久| 天天添夜夜摸| 久久精品91蜜桃| 久久草成人影院| 99在线人妻在线中文字幕| 亚洲午夜精品一区,二区,三区| 久9热在线精品视频| 男人舔女人下体高潮全视频| 成人精品一区二区免费| 亚洲精品久久国产高清桃花| 99国产极品粉嫩在线观看| 久久午夜综合久久蜜桃| 一个人免费在线观看电影 | 久久草成人影院| 免费高清视频大片| 亚洲av五月六月丁香网| 国产麻豆成人av免费视频| 久久精品aⅴ一区二区三区四区| 国产成人精品久久二区二区免费| 99riav亚洲国产免费| 免费看a级黄色片| 99热这里只有是精品50| 亚洲av熟女| 欧美+亚洲+日韩+国产| 中文字幕最新亚洲高清| 一个人免费在线观看电影 | 国产视频内射| 精品乱码久久久久久99久播| 亚洲自偷自拍图片 自拍| 别揉我奶头~嗯~啊~动态视频| 久久精品aⅴ一区二区三区四区| 亚洲av片天天在线观看| 禁无遮挡网站| 少妇丰满av| 啦啦啦观看免费观看视频高清| 免费搜索国产男女视频| 国产av在哪里看| 欧美一级a爱片免费观看看| 欧美在线一区亚洲| 人人妻,人人澡人人爽秒播| 亚洲av成人精品一区久久| 欧美zozozo另类| 好男人电影高清在线观看| 国产综合懂色| 成人午夜高清在线视频| 久久欧美精品欧美久久欧美| 亚洲人成网站高清观看| 免费人成视频x8x8入口观看| 日韩精品青青久久久久久| 两个人看的免费小视频| 欧美zozozo另类| 久久久久亚洲av毛片大全| 久久久精品大字幕| 亚洲国产精品成人综合色| 日韩精品青青久久久久久| 日本一本二区三区精品| 亚洲黑人精品在线| 2021天堂中文幕一二区在线观| 一级毛片女人18水好多| 午夜福利在线观看吧| 国产成人系列免费观看| 小蜜桃在线观看免费完整版高清| 国产精华一区二区三区| 一区福利在线观看| 香蕉久久夜色| 久99久视频精品免费| 国产欧美日韩一区二区三|