• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    DAVS: Dockerfile Analysis for Container Image Vulnerability Scanning

    2022-08-24 12:58:16ThienPhucDoanandSouhwanJung
    Computers Materials&Continua 2022年7期

    Thien-Phuc Doan and Souhwan Jung

    School of Electronic Engineering, Soongsil University, Seoul, 06978, Korea

    Abstract: Container technology plays an essential role in many Information and Communications Technology (ICT) systems.However, containers face a diversity of threats caused by vulnerable packages within container images.Previous vulnerability scanning solutions for container images are inadequate.These solutions entirely depend on the information extracted from package managers.As a result, packages installed directly from the source code compilation, or packages downloaded from the repository, etc.,are ignored.We introduce DAVS-A Dockerfile analysis-based vulnerability scanning framework for OCI-based container images to deal with the limitations of existing solutions.DAVS performs static analysis using file extraction based on Dockerfile information to obtain the list of Potentially Vulnerable Files (PVFs).The PVFs are then scanned to figure out the vulnerabilities in the target container image.The experimental shows the outperform of DAVS on detecting Common Vulnerabilities and Exposures (CVE) of 10 known vulnerable images compared to Clair- the most popular container image scanning project.Moreover, DAVS found that 68% of real-world container images are vulnerable from different image registries.

    Keywords: Container security; vulnerability scanning; OCI image analysis

    1 Introduction

    Virtualization is applied to many fields in Information and Communication Technology (ICT)systems.In particular, 5G networks use virtualization as a way to optimize hardware capabilities.Traditional VM technology faces a performance problem due to virtualizing numerous components that were not necessary for the system repeatedly (i.e., multiple identical VMs running multiple kernels), which indirectly wastes unnecessary computation resources.In contrast, the container shows better performance [1].By sharing the OS kernel, containers give significantly higher performance than VMs.Docker containers are being considered as a replacement for virtual machines in highperformance systems.

    Container technology has many advantages over VMs, but they are not secure enough.Sultan et al.[2] pointed out four threats models of Container security and a set of protecting solutions,from software-based to hardware-based.Gao et al.argued that several theoretical attack vectors break resource control (cgroup) [3] in the Linux container system.Therefore, developers often need to concentrate on checking for the vulnerability of their product, especially the container image.

    Current vulnerability analysis solutions for Docker containers are inadequate.Scanning tools such as Trivy [4], Clair [5] entirely depend on the information extracted from package managers(e.g., dpkg, apk).Firstly, the scanning solution reads the metadata of the package manager inside the container image (e.g., dpkg metadata file is stored inside/var/lib/dpkg/status).Then, the tool gets the package name as well as the version then compares it with the CVE database to point out the known vulnerabilities.However,applications installed directly from the source code compilation, downloaded from the repository, etc., are left out.Subsequently, vulnerabilities coming from these packages are not detected.In other words, the coverage of current solutions is low.

    We propose DAVS-Dockerfile Analysis for Vulnerable Scanning.DAVS leverages a copious amount of information in the Dockerfile to scrutinize the corresponding container image.This scheme statically analyzes the container image, even without Dockerfile attachment needed, to obtain aPotentially Vulnerable Files (PVFs) list.ThePVFsingress into a Vulnerability Checking module for known CVEs (Common Vulnerabilities and Exposures) detection.This procedure helps DAVS deal with the shortcoming of previous scanning solutions by focusing on in-build-time compiled, downloaded, and added packages that previous vulnerable scanning solutions have not done.Moreover, Clair or Trivy can cooperate with DAVS to increase coverage.

    This paper has the following contributions:

    ?A new scheme for analyzing Dockerfile, which tracks the behavior while constructing a container image, is introduced.This method is helpful to expose the installed packages’name and their version.

    ?This paper proposes DAVS-a framework to statically analyzes Dockerfile to extract Potentially Vulnerable Files (PVFs) that help detect known vulnerabilities (i.e., represented in the form of CVE metadata) in container images more efficiently.

    ?By using DAVS, this work gives a high warning to the community of the risks of using public container images.

    To sum things up, this work proposes a new system to overcome the imperfections of previous container image vulnerability scanning.By pinpointing vulnerabilities in container images, DAVS helps to reduce security risks when deploying applications to the cloud or edge computing system.Although these systems use many different container engines, DAVS is applicable because it supports all OCI-compliant container engines (e.g., Kubernetes uses CRI-O, Docker, contained as its container runtimes).Therefore, DAVS can help to enhance the security of most current container systems.

    This paper is organized as follows: Related works are listed in Section 2 to express the limitation of previous solutions.Section 3 introduces container technology and how to make a container image.Section 4 describes the architecture of DAVS and explains components and algorithms.The authors show how they evaluate DAVS in Section 5 and discuss their proposed framework in the last section.

    2 Related Work

    Docker image security is an essential part of Docker container system security.Docker advises developers and image composers to suppose that their distributed pipeline contains some actively harmful packages [6].Docker provided theNotary frameworkto create a content trust network that can be enabled in a container registry [7].On the other hand, several tools perform the vulnerable checking for container images [8].Some open their source code, such as Clair, Trivy, Anchore [9],Dagda [10].Some provide a premium feature combined with their cloud or Docker Registry service Docker Security in Docker Enterprise.

    These vulnerable scanning might have different techniques or architectures.However, the overall methods are similar.These tools collect vulnerabilities from many sources such as National Vulnerability Database (NVD), Common Vulnerabilities and Exposures (CVE), then store this information into a vulnerable database with the application (or package) name, version, CVE identity and the affected OS.

    These scanners extract the installed packages and dependencies information inside the container image without running the container.They try to get as much detail as possible about the packages and dependencies, such as name and version.Finally, these tools compare with the vulnerable database to generate the final report.Many studies have relied on the

    Many studies have relied on the vulnerability scanning tools mentioned above to assess the security of image containers [11-17].Shu et al.built DIVA-a framework that automatically discovers,downloads and analyzes container images on Docker Hub [2].Their framework relied on the power of Clair to statically identify vulnerabilities.Michael Falk and his partner Oscar Henriksson utilized Outpost24’s scanner to check the top 1000 Docker images [18].Wist et al.downloaded and scanned over 2500 images from Docker Hub using theAnchoreframework [19].Liu et al.extracted any executed programs (e.g., JAR, Shell script) in the container images and scanned them usingVirus totals[20].Their proposal helps detect malicious container images.However, it cannot work for vulnerable detection.In a word, current studies on vulnerability checking on container images primarily leverage popular scanning solutions for their statistical research.Tab.1 shows the characteristics of state-ofthe-art techniques.

    Table1:The comparison of previous vulnerability scanning solutions for container images.Thesymbol×means“not applicable.”

    Previous container image scanning tools extract information from the packages, libraries and software within the image.However, these techniques are highly dependent on the Package manager(e.g.,apt,yum,dkpg).Consequently, packages installed directly through compiling, downloading, or adding executables precisely to the image are ignored.Therefore, an additional solution is needed to extract the required information about the custom applications (i.e., the directly installed packages).

    3 Background

    3.1 Container Technologies

    Docker container is a lightweight, standalone, executable package of software that includes everything needed to run an application: code, runtime, system tools, system libraries and settings[21].Containers are isolated from each other and bundle their software, libraries and configuration files.They can communicate through well-defined channels.Containers require fewer resources than virtual machines since they are shared the same operating system kernel.

    The Open Container Initiative (OCI) has been working since 2015 to standardize a container system’s structures, specifications and workflows.At present, OCI contains two specifications: Runtime specification and Image specification.

    In the Image specification, OCI expresses that the container image has a layered structure.All of the layers are read-only, which means they cannot be modified while using it.Any changes will be compressed and updated as a new layer of the new image’s version (tag).Container images become containers at runtime.Then a read-write layer on top of the other layers will be generated for the operation.This architecture ensures that multiple containers using the same image have no collision.

    3.2 The Making of Docker Container Image

    As shown in Fig.1, a Docker image is made by using two main ways.First, the image is built using Dockerfile.Docker builds images automatically by reading the instructions from a Dockerfile, a text file containing all commands to build a given image.A Dockerfile adheres to a specific format and set of instructions.FROM, COPY and RUNinstructions become three corresponding layers from the bottom up to the top.Each layer has a hash value to distinguish, in case of the same Instruction, but different files, while the building executes, is added into the layers.

    Second, the image is created after the runtime container changes (e.g., installing new packages,adding files, modifying files or directories).All the changes will be concentrated inside a new layer.The new image should have a new name tag as the identification to distinguish from others.

    Figure 1: (Continued)

    Figure 1: Themaking of a container image.(a): Container lifecycle (b) Twoways to make an OCI-based container image

    4 DAVS Design

    We take advantage of Dockerfile to track potentially vulnerable files (PVFs).In detail, Dockerfile contains a set of instructions that guide the docker daemon to run commands to build the docker image.By inspecting Dockerfile, the activity of container image-making progress is revealed.DAVS,as shown in Fig.2, the container image will be analyzed through three steps:Reversing Dockerfile,Layer mapping,Potentially Vulnerable Files extraction.After these steps, the layer objects containing PVFs information are fed to the CVE-Bin-Tool to detect CVEs related to each container image layer.

    Figure 2: DAVS design.Container image scanning using Dockerfile analysis

    4.1 Dockerfile Reversing

    While storing the container image in a registry, Dockerfile is not attached in the compressed image.Therefore, we need a method to reverse (or extract) the Dockerfile from an unknown container image.

    The OCI does not mention how to make an OCI-based image.However, there is a list of configurations that a container image should follow.Docker donated their image specification to OCI.In other words, OCI images can be built from Dockerfile.Buildah [22] is a popular project that supports build OCI-based images from Dockerfile.In contrast, a Docker image should have a similar configuration to an OCI-based image.Each container image contains the manifest file, which stores general information about the image, including the activities during the image-making progress.Taking advantage of the information described in the OCI standard, we develop the Dockerfile reversing algorithm from any OCI-based image (including Docker container image).

    The workflow ofDockerfile reversing algorithmis described in detail in Fig.3.The algorithm is developed by following two main steps.First, we extract the history field from the manifest file.There are several components inside the history field.Each component contains three properties:created,created_byandempty_layer.Thecreatedproperty informs the time of the action mentioned increated_by.Theempty_layerproperty tells us whether this action will create an empty layer or not.Second, we translate the history component to the instruction name.Thecreated_byproperty has two types of initiation:#(nop)andnon-#(nop).Non-#(nop)command will be translated toRUNInstruction.The first component will becomeFROMInstruction.#(nop)command contains the Instruction’s name right after the#(nop)mark.

    Figure 3: Dockerfile reversing algorithm for OCI-based container image

    4.2 Layer Mapping

    After getting the Dockerfile from the container image, we need to align each Instruction with its respective layer correctly.The Layer Mapping module ensures the correct process for extracting PVFs.For example, the analysis of Dockerfile figures out that the second Instruction (e.g., RUN command try to download a binary from the Internet) could generate PVFs.However, the second Instruction is used to guide the building framework to make the first image layer.As a result, the failed mapping between each Instruction in Dockerfile makes the finding PVFs broken.

    Following the guideline of Dockerfile Reference [23], FROM, RUN, ADD, COPY are instructions that guide the Docker daemon to create a new layer.Based on the Dockerfile, we can know the order of the Instructions.The layer’s name can be extracted from the manifest of the containerimage.However, it has a reverse order compared to the Dockerfile.Therefore, we have carefully mapped the layer with the Instruction in Dockerfile.

    The mapping layer object contains the following structure:

    ?Type of Instruction: is layer or not

    ?File list: The list of files that belong to this mapping

    ?Potentially vulnerable files: The list of files that might be vulnerable

    ?Layer ID: the corresponding Layer ID of the container image

    The mapping process is described in Fig.4.The method takes the Dockerfile content (reversed from a container image) and the Layer ID list, extracted from the container image manifest, as the input and returns the complete mapping (in a list of mapping layer objects).

    Figure 4: The mapping algorithm of Dockerfile’s Instructions and OCI-based container image layers

    4.3 PVF (Potentially Vulnerable File) Extraction

    The most crucial step of DAVS is to analyze the Dockerfile to locate which part of the container image needs to be checked.Dockerfile neatly reflects the activities of the image-making process.Following this behavior, DAVS determines the list of files that we need to scan further, but these files should not overlap with the previous scanning solution for saving cost.

    Potentially Vulnerable Files (PVFs) are the list of files that are added into the layer or downloaded from the local network (or the Internet) or other file-sharing sources.These files are custom service which is not installed by the package manager (e.g., dpkg).PVFs are also binary files with the executing privilege or shared object files intended to load by a program.DVAS will not focus on the file that is trusted.For example, the based image from official vendors such as Alpine, Ubuntu, Redhat.

    Based on the definition, we filter out the PVFs from the container image layer-by-layer using the Dockerfile information and the mapping from the previous step with the following rules:

    ?FROM instruction layer:The files inside FROM instruction layer are from the based operation system (e.g., alpine, ubuntu, centos), from which the container image is built.Therefore, we don’t need to extract the vulnerable files list from this layer if the layer is from a well-known operating system.

    ?ADD/COPY instruction layer:The files inside this layer are always needed to check for vulnerability.Therefore, we need to filter out the files which have the executable privilege.

    ?RUN instruction layer:In the action guided byRUNinstruction, the author may download the extra files by usingwget, curl, scp, ftp, nc andother network establishment commands.In addition, if theRUNinstruction contains make, build, setup and other compiling commands required to be checked.Moreover, ifRUNinstruction contains downloadable and compilable commands, all the executable files will become PVFs.

    Fig.5 shows the parts in Dockerfile covered by DAVS and scanning tools (e.g., Clair).The highlighted sections are files added to the container image or loaded from the Internet and directly compiled during image building.Besides, the scanning tool only covers the packages installed in the image through the package manager apt-get.Obviously, this image’s most important components (i.e.,FFmpeg application)are compiled directly via the make install command.Therefore, the package manager (e.g.,apt-get) cannot store FFmpeg’s information.The scanning tool will now ignore large amounts of information about the packages contained in the images, resulting in a lack of vulnerability detection.

    Figure 5: Comparison of the coverage parts between PVFs extraction method and Clair (a popular image scanning tool).Green highlights represent PVFs extraction coverage.Yellow highlights represent Clair coverage

    4.4 Vulnerability Checking

    After getting the potentially vulnerable files (PVFs) list, we use CVE-Bin-Tool [24] to extract the name and the version to which PVFs belong.We considered the limitation of CVE-Bin-Tool, which only provides a set of well-known software as well as the string extraction and matching to detect known software versions.However, this work does not focus on finding new vulnerabilities but help developers and container system administrator be aware of the risk of using certain container images.

    Fig.6 shows the workflow of scanning an OCI-based image.The container layer can be reused in several container images.DAVS extracts and scans PVFs independently for each layer (identified by layer ID).Detection results are also saved corresponding to each layer, identified by layer ID.In the case of images used the same couple of layers, the scanned layers do not need to be re-executed to increase system performance.

    Figure 6: Vulnerability checking progress

    5 Experience Setup and Evaluation

    This paper has several research questions to evaluate the proposed scheme:

    ?RQ1:How well doesDAVSdetect known CVE on vulnerable images over the previous container image scanning solution?

    ?RQ2:How much is the detecting coverage rate that DAVS could be used to improve previous container image scanning solutions?

    ?RQ3:What is the situation of real-world container image in popular public registries?

    5.1 Experience Setup

    We collect and download the container images from public registries to build two datasets: (1)Container images contain known vulnerabilities; (2) The latest updated container images on Docker Hub come from many different developers.For the (1) datasets, we archived 10 images from Vulhub[25], the collection of vulnerable images for training purposes.The detail of dataset (1) is shown in Tab.2.For the (2) datasets, we archived 1200 top latest updated containers from Docker Hub [26], 200 from quay.io [27].

    Table 2: Dataset (1) evaluation.The number of known vulnerabilities related CVEs

    We use Python3 as the primary coding language for the DAVS framework.The framework is run in an Intel NUC mini PC with a Core-i3 chipset and 8 GBs of Memory, running Ubuntu 20.04 LTS.

    5.2 Evaluation

    RQ1: Detection of related CVEs to the known vulnerable container images

    Dataset (1) is used to check the vulnerability of corresponding image detection accuracy.A package of a specific version may be affected by multiple CVEs.Therefore, we not only define the exact number of related CVEs (i.e., CVEs that affect the package) but also check the CVE’s ID that vulnerable images are built for.

    We compare the detection accuracy of DAVS with Clair-The most popular container image scanning solution.Clair scans the whole image as usual.In contrast, CVE-Bin-Tool is designed to scan a set of files or directories, not for the container image.Therefore, we extract the image from the repository using Docker save command.After that, we scan the whole extracted file from the image.Tab.1 shows the evaluation result of the dataset (1).Clair scans images very fast because it extracts package information from package manager metadata.However, Clair gives low accuracy when 9/10 images could not detect the correct CVE ID for which the target images are built.We use CVE-Bin-Tool to scan all of the files in the image.Nevertheless, the scanning time is high, as shown in Fig.7.DAVS, with itsPVFsfiltering rules, keeps the high accuracy of detecting related CVEs of the target vulnerable image and significantly decreases the scanning time compared to all files scanning using CVE-Bin-Tool.

    Figure 7: Scanning time comparison (in ms)

    RQ2: The extra number of CVEs that DAVS outperform Clair.

    We inspect the number of CVEs that DAVS and Clair can detect on both Datasets (1) and (2).We also filter the number of CVEs that DAVS and Clair overlap.As shown in Fig.8, the number of CVEs detected by DAVS accounts for more than 50% of the CVEs that DAVS and Clair can detect, which proves the PVFs filtering rules work well.On the other hand, the overlap rate is inconsequential.

    Figure 8: The detected CVEs rate (number of detected CVEs over the total of DAVS and Clair) that DAVS and Clair can archive

    We built an automatic crawler for dataset (2) to obtain the list of container images in Docker Hub and Quay.io.Then directly pull and scan the images with DAVS and Clair.While evaluating the real-world container images from DockerHub, we found that DAVS detects an extra 53% of CVEs over Clair.In addition, Clair cannot detect any CVEs in 336 vulnerable container images, which are successfully discovered by our method.

    RQ3: The risk of using public container image.

    To evaluate the safety of using public container images, we use DAVS integrated with Clair for checking the dataset (2).Through all 1400 images, we found that nearly 68% of container images are vulnerable,asshownin Fig.9.Therefore, the use of public container images is not safe, especially from Docker Hub- the most popular container registry.

    Figure 9: The vulnerable images rate in real-world

    6 Discussion and Future Work

    DAVS is a solution to overcome the shortcomings of the previous container image scanning tools.While these projects rely on package managers’information, installed packages on the Internet or compiled during the building container image are ignored.With the Dockerfile analysis technique,DAVS tracks the workflow of the container image-making efficiently.Potentially Vulnerable Files are extracted and scanned that help to improve the detecting coverage.

    DAVS is still costly since it needs to check a list of files in an image layer.Even the scanning process is divided with the layer-by-layer scanning operation, the complexity of the PVFs filtering algorithm is still high.Moreover, DAVS depends on CVE-Bin-Tool, which has limited functionality, which is only implemented string extraction and inspection, on checking packages’names and versions of unknown binaries inside the container image.We let the optimization for our future work.

    We also consider that scanning solutions missed software errors due to many other reasons, such as the late update of the CVE database.Then, dynamic analysis solutions, such as anomaly detection,are needed to enhance the security of the container system.The checking of users’data in the cloud system while preserving privacy is a significant challenge [28-30].The integrity checking of container images is also one of our future works.

    Acknowledgement:This work is the extended work of“DAVS: Dockerfile Analysis for Vulnerable Scanning”inMobiSec2021:The5th International Symposiumon Mobile Internet Security,Jeju Island,South Korea.

    Funding Statement:This work was supported by the Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korea Government (MSIT) (No.2020-0-00952, Development of 5G edge security technology for ensuring 5G+ service stability and availability.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    午夜福利影视在线免费观看| 亚洲一码二码三码区别大吗| 很黄的视频免费| 亚洲国产精品久久男人天堂| 国产成+人综合+亚洲专区| 午夜视频精品福利| 日本精品一区二区三区蜜桃| 黄片大片在线免费观看| 级片在线观看| 国产亚洲精品久久久久久毛片| 大型黄色视频在线免费观看| 99在线人妻在线中文字幕| av超薄肉色丝袜交足视频| 桃色一区二区三区在线观看| 一级毛片精品| 一区二区三区高清视频在线| 长腿黑丝高跟| 国产欧美日韩一区二区精品| xxx96com| 亚洲精品中文字幕在线视频| 国产精品二区激情视频| 成人手机av| www.熟女人妻精品国产| 成年版毛片免费区| 日本欧美视频一区| 亚洲国产精品成人综合色| 99久久精品国产亚洲精品| 人妻丰满熟妇av一区二区三区| 亚洲欧美精品综合一区二区三区| 久久亚洲精品不卡| 男女下面插进去视频免费观看| 久久久精品国产亚洲av高清涩受| 看片在线看免费视频| 久久久久久免费高清国产稀缺| 亚洲精品久久成人aⅴ小说| 亚洲九九香蕉| 老司机午夜福利在线观看视频| 国产成人精品久久二区二区免费| 91字幕亚洲| 亚洲激情在线av| 久久精品国产亚洲av高清一级| 国产成人一区二区三区免费视频网站| 热re99久久国产66热| 免费在线观看影片大全网站| 日韩三级视频一区二区三区| 久99久视频精品免费| 午夜免费鲁丝| 亚洲 欧美 日韩 在线 免费| 亚洲成人国产一区在线观看| 国产色视频综合| 久久伊人香网站| 天天一区二区日本电影三级 | 午夜福利视频1000在线观看 | 十八禁网站免费在线| 男人的好看免费观看在线视频 | 精品无人区乱码1区二区| 怎么达到女性高潮| 亚洲熟女毛片儿| 国产av一区二区精品久久| av视频在线观看入口| aaaaa片日本免费| 久久久久久久久中文| 亚洲国产欧美日韩在线播放| 国产成年人精品一区二区| 狠狠狠狠99中文字幕| 中国美女看黄片| 母亲3免费完整高清在线观看| 一个人免费在线观看的高清视频| 19禁男女啪啪无遮挡网站| 日本精品一区二区三区蜜桃| 天天添夜夜摸| 90打野战视频偷拍视频| 亚洲国产精品成人综合色| 又大又爽又粗| 久久香蕉激情| 欧美色视频一区免费| 别揉我奶头~嗯~啊~动态视频| 亚洲欧美激情综合另类| 人妻久久中文字幕网| 久久青草综合色| 看片在线看免费视频| 老熟妇乱子伦视频在线观看| 国产成人欧美| 日韩精品免费视频一区二区三区| 日韩欧美三级三区| 亚洲成人国产一区在线观看| 日韩视频一区二区在线观看| 国内精品久久久久久久电影| 一本大道久久a久久精品| 国产又爽黄色视频| 午夜福利在线观看吧| 精品日产1卡2卡| 两性午夜刺激爽爽歪歪视频在线观看 | 老鸭窝网址在线观看| 亚洲精品久久国产高清桃花| 两人在一起打扑克的视频| 午夜久久久在线观看| 亚洲情色 制服丝袜| 黄色毛片三级朝国网站| 一级黄色大片毛片| 在线视频色国产色| 91精品三级在线观看| 国产主播在线观看一区二区| 男女下面进入的视频免费午夜 | 国产精品久久久久久亚洲av鲁大| 日本 av在线| 国产精品,欧美在线| 国产精品九九99| 国内毛片毛片毛片毛片毛片| 18禁裸乳无遮挡免费网站照片 | av视频在线观看入口| 大香蕉久久成人网| 狂野欧美激情性xxxx| 国产高清videossex| 国产精品一区二区精品视频观看| 在线免费观看的www视频| 成年人黄色毛片网站| 夜夜躁狠狠躁天天躁| 国产精品综合久久久久久久免费 | 国产在线精品亚洲第一网站| 黄色 视频免费看| 长腿黑丝高跟| 亚洲第一欧美日韩一区二区三区| 国产视频一区二区在线看| 午夜免费观看网址| 国产麻豆成人av免费视频| 精品卡一卡二卡四卡免费| 村上凉子中文字幕在线| 99riav亚洲国产免费| 久久午夜综合久久蜜桃| 久久久久久人人人人人| 久久中文字幕一级| 久久国产精品人妻蜜桃| 亚洲专区中文字幕在线| 日本a在线网址| 亚洲国产中文字幕在线视频| 亚洲欧美激情在线| 久久香蕉国产精品| 女人精品久久久久毛片| 免费无遮挡裸体视频| 午夜福利一区二区在线看| 久久精品91无色码中文字幕| 日日摸夜夜添夜夜添小说| 久久人人97超碰香蕉20202| 国产精品日韩av在线免费观看 | 国产精品久久久av美女十八| a级毛片在线看网站| 高清在线国产一区| 亚洲人成网站在线播放欧美日韩| 成人亚洲精品一区在线观看| 日本撒尿小便嘘嘘汇集6| 亚洲国产精品合色在线| 国产91精品成人一区二区三区| 禁无遮挡网站| 色综合婷婷激情| 亚洲欧美日韩无卡精品| 欧美日本中文国产一区发布| 黄色视频,在线免费观看| 亚洲精品在线观看二区| 国产精品二区激情视频| 日韩欧美免费精品| 桃红色精品国产亚洲av| 午夜老司机福利片| 制服人妻中文乱码| 动漫黄色视频在线观看| 亚洲第一青青草原| 91av网站免费观看| 最新在线观看一区二区三区| 成人欧美大片| 老司机靠b影院| 日本 av在线| 久久精品国产亚洲av高清一级| 免费在线观看黄色视频的| 国产aⅴ精品一区二区三区波| 午夜激情av网站| avwww免费| 91成年电影在线观看| 男人的好看免费观看在线视频 | 精品一品国产午夜福利视频| 久久久精品欧美日韩精品| 人人妻人人澡人人看| 50天的宝宝边吃奶边哭怎么回事| 少妇 在线观看| 搡老岳熟女国产| 免费观看人在逋| 亚洲人成伊人成综合网2020| 一区二区三区国产精品乱码| 麻豆久久精品国产亚洲av| 午夜福利一区二区在线看| 久久中文字幕人妻熟女| 亚洲色图 男人天堂 中文字幕| 亚洲欧美激情综合另类| 日韩欧美国产在线观看| 波多野结衣巨乳人妻| 黑人巨大精品欧美一区二区mp4| 嫩草影视91久久| 国产免费av片在线观看野外av| 国产精品av久久久久免费| 亚洲人成电影观看| 大码成人一级视频| 中文字幕av电影在线播放| 国产精品亚洲一级av第二区| 精品一品国产午夜福利视频| 亚洲熟妇中文字幕五十中出| 一区二区三区精品91| 亚洲男人的天堂狠狠| 欧美日韩黄片免| 久久中文字幕人妻熟女| 成人18禁高潮啪啪吃奶动态图| 人人妻,人人澡人人爽秒播| 国产精品久久久久久人妻精品电影| 亚洲男人的天堂狠狠| 12—13女人毛片做爰片一| 国产精品精品国产色婷婷| 精品久久久久久成人av| 国产野战对白在线观看| 青草久久国产| 在线十欧美十亚洲十日本专区| 日韩欧美三级三区| 成人亚洲精品av一区二区| 激情视频va一区二区三区| 日韩欧美免费精品| 啦啦啦韩国在线观看视频| 久久久国产欧美日韩av| 一进一出抽搐动态| 日韩中文字幕欧美一区二区| 免费女性裸体啪啪无遮挡网站| 人人澡人人妻人| 国产国语露脸激情在线看| 热re99久久国产66热| 在线永久观看黄色视频| 免费不卡黄色视频| 欧美一区二区精品小视频在线| 国产亚洲精品久久久久5区| 黑人欧美特级aaaaaa片| 搡老岳熟女国产| 亚洲色图 男人天堂 中文字幕| 午夜福利影视在线免费观看| 久久香蕉国产精品| 91大片在线观看| 黑人巨大精品欧美一区二区蜜桃| 一本久久中文字幕| 国产在线精品亚洲第一网站| 91成人精品电影| 久久午夜亚洲精品久久| 曰老女人黄片| 久久香蕉国产精品| 黄色a级毛片大全视频| 午夜影院日韩av| 一区二区三区精品91| 免费在线观看视频国产中文字幕亚洲| 深夜精品福利| 精品久久久久久成人av| 成人三级黄色视频| 国产精品秋霞免费鲁丝片| 9热在线视频观看99| 久久香蕉国产精品| 久久国产精品人妻蜜桃| 免费少妇av软件| 黑丝袜美女国产一区| 国产精品永久免费网站| 嫩草影视91久久| 免费看十八禁软件| 又黄又粗又硬又大视频| videosex国产| 最近最新中文字幕大全电影3 | 日本 av在线| 黄色片一级片一级黄色片| 国产亚洲精品一区二区www| 国产一卡二卡三卡精品| 欧美日韩亚洲国产一区二区在线观看| 亚洲成人精品中文字幕电影| 精品熟女少妇八av免费久了| 在线观看免费日韩欧美大片| 亚洲av第一区精品v没综合| 日韩欧美在线二视频| 国产欧美日韩一区二区三区在线| 国产av又大| 欧美激情久久久久久爽电影 | 中文字幕高清在线视频| 日韩欧美一区视频在线观看| 成人国语在线视频| 嫩草影视91久久| 国产成人影院久久av| 精品久久久精品久久久| 亚洲狠狠婷婷综合久久图片| 高潮久久久久久久久久久不卡| 午夜福利欧美成人| 在线av久久热| 99国产极品粉嫩在线观看| 高清毛片免费观看视频网站| 777久久人妻少妇嫩草av网站| 国产精品爽爽va在线观看网站 | 校园春色视频在线观看| 久久人人精品亚洲av| 国产av又大| 手机成人av网站| 久久久久久大精品| 国产成人av激情在线播放| 久久久国产欧美日韩av| 日本撒尿小便嘘嘘汇集6| 精品不卡国产一区二区三区| 十八禁网站免费在线| 一卡2卡三卡四卡精品乱码亚洲| 日本免费一区二区三区高清不卡 | 久久婷婷成人综合色麻豆| 久久中文字幕一级| 国产精品永久免费网站| 国产av在哪里看| 午夜福利视频1000在线观看 | 成年人黄色毛片网站| 少妇熟女aⅴ在线视频| 丰满的人妻完整版| 国产麻豆成人av免费视频| 亚洲成人免费电影在线观看| 日韩高清综合在线| 一级a爱视频在线免费观看| 香蕉丝袜av| 一区二区三区国产精品乱码| 19禁男女啪啪无遮挡网站| 国产精品 欧美亚洲| 不卡av一区二区三区| 久久久久久国产a免费观看| 日韩欧美国产在线观看| 久久精品国产清高在天天线| 亚洲第一电影网av| 午夜福利一区二区在线看| 熟女少妇亚洲综合色aaa.| 99国产极品粉嫩在线观看| 99香蕉大伊视频| 亚洲中文字幕日韩| www.www免费av| 在线十欧美十亚洲十日本专区| 成人免费观看视频高清| 99精品在免费线老司机午夜| 亚洲精品美女久久av网站| 久久人人爽av亚洲精品天堂| 99热只有精品国产| 精品第一国产精品| 91麻豆精品激情在线观看国产| 校园春色视频在线观看| 国产主播在线观看一区二区| 国产成人啪精品午夜网站| 亚洲国产精品999在线| 性少妇av在线| 亚洲av成人不卡在线观看播放网| 一级作爱视频免费观看| 亚洲成人久久性| 在线观看免费日韩欧美大片| 亚洲 欧美 日韩 在线 免费| 亚洲色图 男人天堂 中文字幕| 国产精品亚洲一级av第二区| 中亚洲国语对白在线视频| 久久久久国产精品人妻aⅴ院| 99精品欧美一区二区三区四区| 人妻久久中文字幕网| 一级a爱片免费观看的视频| 热99re8久久精品国产| 亚洲精品国产区一区二| 中文字幕人妻熟女乱码| 每晚都被弄得嗷嗷叫到高潮| 制服诱惑二区| 日本免费一区二区三区高清不卡 | 天天躁狠狠躁夜夜躁狠狠躁| 可以免费在线观看a视频的电影网站| 人人妻,人人澡人人爽秒播| 国产成人一区二区三区免费视频网站| 日韩精品青青久久久久久| 一区在线观看完整版| 精品国产超薄肉色丝袜足j| 久久天躁狠狠躁夜夜2o2o| 在线十欧美十亚洲十日本专区| 搡老妇女老女人老熟妇| 亚洲国产精品合色在线| 免费人成视频x8x8入口观看| 麻豆成人av在线观看| 一级片免费观看大全| 欧美精品亚洲一区二区| 中国美女看黄片| 少妇 在线观看| 免费看十八禁软件| 国产精品98久久久久久宅男小说| 麻豆av在线久日| 亚洲欧美日韩另类电影网站| 久久久久国内视频| 不卡一级毛片| 一区二区三区精品91| 曰老女人黄片| 国产成人影院久久av| 欧美成人午夜精品| 精品欧美国产一区二区三| 国产午夜福利久久久久久| 亚洲人成电影观看| 精品一区二区三区视频在线观看免费| 久久性视频一级片| 久久精品91蜜桃| 欧美激情高清一区二区三区| 满18在线观看网站| 精品第一国产精品| 久久精品aⅴ一区二区三区四区| 国产极品粉嫩免费观看在线| 亚洲精品在线美女| а√天堂www在线а√下载| 免费观看精品视频网站| 美女免费视频网站| 国产精品美女特级片免费视频播放器 | 一级毛片高清免费大全| 亚洲,欧美精品.| 亚洲免费av在线视频| 欧美亚洲日本最大视频资源| cao死你这个sao货| 中文字幕高清在线视频| 亚洲视频免费观看视频| 性少妇av在线| 18禁观看日本| 久久性视频一级片| 国产乱人伦免费视频| 亚洲性夜色夜夜综合| 亚洲精品国产色婷婷电影| av天堂在线播放| 国产成人影院久久av| 中文字幕精品免费在线观看视频| 黄色女人牲交| 大码成人一级视频| 久久久久亚洲av毛片大全| 久久精品成人免费网站| 欧美国产精品va在线观看不卡| 黄色视频不卡| 九色国产91popny在线| 久久久国产欧美日韩av| 国产欧美日韩综合在线一区二区| 又紧又爽又黄一区二区| 嫁个100分男人电影在线观看| 亚洲 欧美 日韩 在线 免费| 在线观看日韩欧美| av天堂在线播放| 狂野欧美激情性xxxx| 国产又色又爽无遮挡免费看| 高清在线国产一区| 亚洲久久久国产精品| 我的亚洲天堂| 久久久久久国产a免费观看| 国产精品电影一区二区三区| 亚洲精品粉嫩美女一区| 91九色精品人成在线观看| 国产精品精品国产色婷婷| 日韩国内少妇激情av| 99国产精品一区二区蜜桃av| av免费在线观看网站| 亚洲五月婷婷丁香| 亚洲国产欧美日韩在线播放| 黑人巨大精品欧美一区二区mp4| 久久中文字幕人妻熟女| 日日夜夜操网爽| 午夜福利,免费看| 多毛熟女@视频| 日韩 欧美 亚洲 中文字幕| 久久这里只有精品19| 亚洲成人免费电影在线观看| 亚洲黑人精品在线| 一本大道久久a久久精品| 国产一区二区激情短视频| 国产高清videossex| 波多野结衣av一区二区av| 18禁黄网站禁片午夜丰满| 亚洲最大成人中文| 国产黄a三级三级三级人| 真人一进一出gif抽搐免费| 成年版毛片免费区| 亚洲熟妇中文字幕五十中出| 久久久国产成人精品二区| 在线观看免费视频日本深夜| 一夜夜www| 国产片内射在线| 国产成人欧美| а√天堂www在线а√下载| 啦啦啦韩国在线观看视频| av在线播放免费不卡| 高清毛片免费观看视频网站| 欧美日韩瑟瑟在线播放| 大型av网站在线播放| 麻豆成人av在线观看| 欧美色视频一区免费| 12—13女人毛片做爰片一| 亚洲人成电影观看| 国产精品1区2区在线观看.| 亚洲男人天堂网一区| 亚洲第一欧美日韩一区二区三区| 免费看a级黄色片| 免费在线观看亚洲国产| 日韩欧美国产一区二区入口| 日韩一卡2卡3卡4卡2021年| 天天躁夜夜躁狠狠躁躁| 女警被强在线播放| 纯流量卡能插随身wifi吗| 久久久久久久久久久久大奶| 首页视频小说图片口味搜索| 欧美精品亚洲一区二区| 嫩草影院精品99| svipshipincom国产片| 亚洲伊人色综图| 国产欧美日韩综合在线一区二区| 亚洲成人久久性| 好男人在线观看高清免费视频 | 精品久久久久久久久久免费视频| 神马国产精品三级电影在线观看 | 嫩草影视91久久| 国产精品爽爽va在线观看网站 | 日本撒尿小便嘘嘘汇集6| 亚洲专区字幕在线| 国产精品免费一区二区三区在线| 国产精品秋霞免费鲁丝片| 在线观看舔阴道视频| 丁香欧美五月| 又大又爽又粗| 亚洲中文日韩欧美视频| 国产私拍福利视频在线观看| 高清在线国产一区| 一进一出好大好爽视频| 9色porny在线观看| 美女高潮喷水抽搐中文字幕| 我的亚洲天堂| 女生性感内裤真人,穿戴方法视频| 精品国内亚洲2022精品成人| 亚洲精品美女久久av网站| 国内精品久久久久精免费| 国产精品二区激情视频| 日日爽夜夜爽网站| 成人免费观看视频高清| 咕卡用的链子| 日韩欧美免费精品| 久久久久国产精品人妻aⅴ院| 日日干狠狠操夜夜爽| 欧美日韩瑟瑟在线播放| 1024视频免费在线观看| 黄网站色视频无遮挡免费观看| 如日韩欧美国产精品一区二区三区| 欧美日韩黄片免| 久久香蕉激情| 侵犯人妻中文字幕一二三四区| 精品久久久久久久毛片微露脸| 亚洲情色 制服丝袜| 美女大奶头视频| 97超级碰碰碰精品色视频在线观看| 91成人精品电影| 99久久精品国产亚洲精品| 在线视频色国产色| 可以免费在线观看a视频的电影网站| 亚洲精品一区av在线观看| 国产精品乱码一区二三区的特点 | 看片在线看免费视频| 91成年电影在线观看| 看黄色毛片网站| 久久精品人人爽人人爽视色| 色综合婷婷激情| 亚洲av第一区精品v没综合| 亚洲午夜精品一区,二区,三区| 欧美成人性av电影在线观看| 99国产精品一区二区三区| 两个人视频免费观看高清| 亚洲一区中文字幕在线| 一级,二级,三级黄色视频| 一区二区三区激情视频| 99在线视频只有这里精品首页| 亚洲伊人色综图| 国产97色在线日韩免费| 无遮挡黄片免费观看| e午夜精品久久久久久久| 啦啦啦免费观看视频1| 自拍欧美九色日韩亚洲蝌蚪91| av在线播放免费不卡| 欧美国产日韩亚洲一区| 黄片小视频在线播放| 日韩大尺度精品在线看网址 | 久久久久久久久中文| 久久中文字幕一级| 9热在线视频观看99| 一边摸一边抽搐一进一小说| 亚洲 欧美 日韩 在线 免费| 男人操女人黄网站| 神马国产精品三级电影在线观看 | 日韩欧美三级三区| 看免费av毛片| 久久精品人人爽人人爽视色| 9191精品国产免费久久| 午夜亚洲福利在线播放| 国产精品98久久久久久宅男小说| 国产成人影院久久av| 国产一区二区三区视频了| 99久久国产精品久久久| 亚洲成人精品中文字幕电影| 色av中文字幕| 1024香蕉在线观看| 亚洲色图综合在线观看| 亚洲av电影在线进入| 又黄又粗又硬又大视频| 亚洲一码二码三码区别大吗| 亚洲 欧美 日韩 在线 免费| 欧美日韩一级在线毛片| 国产男靠女视频免费网站| 中文字幕色久视频| 久久精品国产清高在天天线| 国产精品电影一区二区三区| 成人亚洲精品一区在线观看| 老司机深夜福利视频在线观看| 中国美女看黄片| 12—13女人毛片做爰片一| 很黄的视频免费| 啦啦啦免费观看视频1| 黄色丝袜av网址大全| 亚洲av美国av| 国产精品电影一区二区三区| 亚洲性夜色夜夜综合| 国产精品98久久久久久宅男小说| 国产色视频综合|