精品欧美一区二区三区在线观看 _久久久久国色av免费观看性色_国产精品久久在线观看_亚洲第一综合网站_91精品又粗又猛又爽_小泽玛利亚一区二区免费_91亚洲精品国偷拍自产在线观看 _久久精品视频在线播放_美女精品久久久_欧美日韩国产成人在线

Tech Director of Dosec.cn Discusses Best Practices for Cloud-native Security Architecture De

原創 精選
Techplur
In this article, we invited Mr. Bai Liming, technology director of Dosec.cn, to present some best practices for building cloud-native security architectures based on the company's expertise and experi

With its efficient, stable, and responsive features, cloud-native has become a key driver of digital innovation in enterprises. At the same time, security risks are also increasing in cloud-native environments, prompting enterprises to seek appropriate architecture design solutions.

In this article, we invited Mr. Bai Liming, technology director of Dosec.cn, to present some best practices for building cloud-native security architectures based on the company's expertise and experience.


1. Development of cloud-native

The concept of cloud-native was first introduced in 2013 by Pivotal, a company recognized for its multi-cloud application platform Cloud Foundry. Two years later, Matt Stine, Pivotal's technical product manager, defined the five principles of cloud-native architecture in his book "Migrating to Cloud-Native Application Architecture":

Compliant with 12-factor apps;

Microservice-oriented architecture;

Self-Service Agile Architecture;

API-based collaboration;

Antifragile.

According to the CNCF Cloud Native Definition v1.0, which was approved on June 11, 2018, cloud-native should have the following characteristics:

· Containers;

· Service meshes;

· Microservices;

· Immutable infrastructure;

· Declarative APIs.

Applications that meet all five of the characteristics above will be cloud-natives ones.

Throughout the evolution of cloud-native, containerization has further simplified the capabilities and features of the operating system. Cloud-native operating systems were developed to meet the immutable infrastructure requirement. It features a streamlined kernel, retains only container-related dependency libraries, and uses a container user end as a package manager.

In cloud-native operating systems,all processes must run in containers. As no application can be installed on the OS host, the OS becomes completely immutable, known as the immutable infrastructure, and is expected to be the future of OS development.

In the past, applications were run on physical machines, but as the infrastructure evolved, they moved to virtual machines and later to containers. In the era of cloud computing, serverless architecture seems to be the newest fad.

A physical machine's life cycle is typically measured in years and terminated after a year or five. For virtual machines, the unit of measurement is the month.

With the advent of containerization,each update requires rebuilding a new container; as a result, container lifecycles are measured in days. While serverless computing progresses,function virtualization will be measured in minutes.

The emergence of containerization accelerated the process of standardizing containers. Containers and DevOps complement each other, and application container platforms should follow a DevOps development model to speed up the release process. Generally,containerization promotes DevOps, and containers rely on DevOps for speeding up iteration.

With containers as the unit of analysis, cloud-native and services represent the network boundary.Cloud-native has no concept of IP addresses as they are all dynamic, and we cannot configure their IP addresses on conventional firewalls. With cloud-native, the container services are updated every day, so the IP address is changed accordingly, and the original network policies are no longer valid.

In the era of physical machines, it is more challenging to deploy physical devices, so running several applications on one physical machine is common. For virtual machines, individual services were usually divided into a single virtual machine to improve service availability. Currently, service interfaces are increasingly dependent upon micro-services, so they must be adapted into microservice architectures.

Here take Weibo (a Chinese microblogging site similar to Twitter) as an example: when there is a hot event, both physical and virtual machines require a more extended build period in hours to allow business recovery. In a containerized scenario, the container begins to operate in seconds, whereas physical and virtual machines start up much more slowly. Therefore, since Weibo adopted a container architecture, hot events are rarely the cause of downtimes. Moreover, this can also be attributed to the self-healing and dynamic scaling capabilities of the K8S platform.

Docker was commonly equated with containers during the early days of container runtimes. Similar to containers,which have four modules, Docker includes four interfaces. Docker, however, is a complete development kit, and K8S will only use the runtime. Therefore, to improve operational efficiency, K8S gradually stopped supporting Docker Shim in version 1.20 and switched to using Docker and Containerd instead.

However, neither Containerd nor Docker provides comprehensive security features. In Cri-o, the needs for relative security can be met, and there is no daemon. Each Cri-o process consists of a parent and child process, which can run as a service. In addition, the next aspect of containers to be considered is the security of the underlying infrastructure, including the technological containerization of security.


2. Risks associated with cloud-native

A cloud-native architecture needs to address five main security concerns:

· Image security

· Image repo security

· Cluster component security

· Container network risks

· Microservices risks

The risks associated with image security are by far the most extensive. Unlike infrastructure security,cloud-native focuses more on performance optimization and infrastructure containerization. At the moment, 51% of DockerHub images have high-risk vulnerabilities, while 80% have low- to medium-risk vulnerabilities. It is common for enterprises to download images from DockerHub.

As for image repositories,enterprises cannot upload all of their R&D and business images to a public repository but must store the source code in their own repository. However,enterprise repositories can also contain vulnerabilities that hackers may exploit,leading to the replacement of images in the repository. It is possible that the actual image pulled from the node is from a hacker with a Trojan horse.

Cluster components such as Docker,K8s, OpenShift, and Cri-o have vulnerabilities and 45 vulnerabilities in other container runtimes such as Containerd and Kata Container. Vulnerabilities associated with cluster components are relatively few, but they do exist.

A hacker who exploits these vulnerabilities will also have access to other containers within the cluster.Physical firewalls can only prevent traffic emanating from outside of the cluster, however, attacks that originate inside the firewalls, such as those caused by K8S overlays and underlays, are not covered by firewalls, hence posing an internal network risk to clusters.

The vulnerability of business images can also lead to a second problem: the vulnerability of the built-in image components. If a developer uses an API or a vulnerable development framework,this type of security problem can arise when the developer packages the components into an image. Previously, the widely impacting Spring Framework 0-day was an infrastructure vulnerability that affected approximately 90% of Chinese Internet enterprises. R&D is typically responsible for introducing this type of microservices risk.


3. Design of a cloud-native security architecture

In the past, infrastructures were primarily protected by firewalls and physical security measures. For the computing environment of containers, container runtime security and image security require professional protection. Moreover, regarding the security of containers, it involves the discovery of microservices and the protection of serverless applications.

A cloud-native scenario requires the R&D security system to be integrated, which differs from a traditional security system. Research and development personnel should be involved in the security design process, and they should always pay attention to the cloud-native data security in R&D and the permissions related to security management.

As part of Dosec.cn's container security solution, there are many built-in and machine behavior learning policies, as well as other disposal policies and events.

Auditing orchestration files is one of the features. It can read all the existing Dockerfiles, Yaml files, and orchestration files directly from the developer's code repository. By inferring syntax from the Dockerfile file, it can detect errors in the command.

In the event that an issue is discovered during the audit, it will be reported to R&D team, and the image building will be disabled. If there is no problem, modifications will be immediately conducted, and the image will be generated once the changes have been made. Next, the image will be reversed into a Dockerfile and compared. A warning will be issued if any tampering with Dockfile is detected.

Moreover, the container business running on the image will also be reversed in order to check whether the image on which the container depends is correct and whether the process running in the image matches the process packaged in the Dockerfile. An alert will be raised if there is an inconsistency found, reporting that the business may be at risk.

The cloud-native approach is immutable, and the underlying OS and image are also included in the immutable infrastructure, so the image is also immutable. An image is built according to the Dockerfile, and the running containers are associated with the image.

Another feature includes the ability to read Yaml files directly from the code repository and to control their permissions. A warning will be raised if there is any deprecated and incorrect syntax, high-risk commands, or other dangerous parameters in the Yaml file. The purpose is to link security, O&M, and R&D teams. It is essential that a cloud-native security strategy is developed in concert with the operational team, developers, and security personnel and should never be solely the responsibility of the security department.

A range of open-source image component scanning tools are available on the market. Currently, Dosec.cn's Jingjie Container Security Platform is available in both open-source and commercial editions, and the main difference is the custom rules and vulnerability library. Open-source vulnerability libraries are based on the open-source CBE vulnerability libraries, which support the Chinese vulnerability database CNNVD. CNNVD requires cooperation, and ordinary open-source vendors may not obtain this database. This is one of the key differences between open-source and commercial editions.

Some custom features are available only in the commercial edition, such as trusted image, base image identification, and host image scanning. There are always security risks associated with image repositories, and we need to scan image repositories for vulnerabilities to build security capabilities within the enterprise.

Furthermore, Dosec.cn has been involved with Harbor for its vulnerabilities, so it has some advantages.

Components of the cluster are also at risk. To find the cluster components at stake, assembling the cluster itself and comparing it with the vulnerability database and the vulnerable version is necessary. Meanwhile, version matching would not work for API interfaces and permission vulnerabilities, but POC tests would be required to determine the risks associated with all cluster components.

By scanning each component's configuration in clusters can scan the permission of configuration. In the early versions of K8S, authentication permissions were not enabled by default, but now it defaults to HTTPS.

Moreover, features such as whether audit logs are turned on, need to be configured based on cluster security,along with compliance check baselines to be scanned.

With cloud-native microservices, the service split will lead to exponential growth in scale, which requires automatic discovery of microservices by security software and identification of the types of services, allowing automatic vulnerability scanning. This method is very labor-saving.

Two methods can be used to detect the in-container security after running. The first is learning and standardizing all the behaviors of containers. Meanwhile, reads/writes on container files, process start-ups and shutdowns, and access calls will be captured and recorded in the behavior model. Accordingly, all the traffic of container running will be considered normal, while the other traffic disposed of will be treated as an exception.

Learning takes time, however, and if the learning process encounters attacks or executes, the results will be biased. A policy can be built into the attack model that will exclude behaviors when they are found to violate the policy. It can be combined with machine learning to protect against zero-day attacks while preventing attacks during the learning process. Blacklisting policies integrated into the system enable it to achieve a perfect closed-loop of machine runtime security testing. This seems to be the best practice for container runtime security at the moment.

Microsegmentation in cloud-native is required to achieve the following features: First, it must enable visualization of access relationships. Inherently, cloud-native segmentation meets the zero trust requirement. K8s does not have an IP concept and relies solely on Labels.These labels are tagged by the R&D and business teams, who will utilize them to implement microsegmentation dynamically. Thus, it is necessary to automatically generate and rehearse the container's policy based on the learning relationship.

When the policy learning is complete and confirmed, it will enter rehearsal mode, where the rehearsal time can be set. The normal traffic flow will not be blocked for a certain period. In the event that traffic flow is found to be affected by the policy, it will be warned.In this case, the company's R&D or business team can make a judgment in person, and if the business traffic is safe, the machine behavior learning model will be edited in order to exclude it.

If no more exceptions are found after a certain period, the trained policy will not affect regular traffic patterns and can effectively defend against attacks. By clicking policy execution, the automatic policy can now be applied to the production environment without affecting it.

Lastly, in cloud-native environments, the security of its own software platform must comply with the three-layer architecture: first, there is the management layer, which must be decoupled from the task center so that all clusters are convergent.

If the image repository contains too much data, the scanning can be integrated directly with the repository image.Instead of relying on network bandwidth to pull the image, it could scan directly while reading the storage path. In this manner,network utilization,as well as disk IO usage, can be significantly reduced, enabling direct reading. Currently, this is the most influential architecture design for container security.


4. Best practices in cloud-native security

There are three main components of DevSecOps design in cloud-native environments. First, there is the construction phase. Dosec.cn provides a golden image repository where all the images are reinforced. R&D personnel can directly pull and build business images from the golden repository.

Having cooperated with CNNVD,Dosec.cn's vulnerability library will be updated directly following synchronization. Additionally, Dosec.cn will maintain its golden image repository in real-time according to the daily vulnerability updates. Moreover,Dosec.cn has its own scanner and security researchers investigating the latest vulnerabilities and zero-day attacks.

The recommendation for enterprises is to maintain two image repositories and set trust judgments for the production image repositories in the cluster. Thus, hackers are prevented from entering the clusters and pulling down business containers directly.

Image scanning is used for business development to scan the configuration of the application layer, and if a vulnerability is discovered, it blocks synchronization. A trust judgment can be set up in the production environment that incorporates all conditions, such as whether the enterprise is using its own environment image repository.

Using the platform, it is also possible to assess the risks associated with vulnerabilities in cluster components and microservices. Among other things, scanning and analyzing vulnerability in images can filter out images so that each image can be identified as its creator, technical impact components, software component analysis, source code scanning, development security scanning, and application vulnerability scanning.

In the event that a container security platform detects an attack, it will provide overall security prevention prior to, during, and after the event. A full evaluation and reinforcement of clusters are conducted beforehand, and all behavior learning will start after the enhancement. When an event occurs, it will check for and implement zero-day defenses, with real-time notifications sent out.

When an attack is detected, the image running should be terminated first. The image will not be uploaded during the R&D, downloaded to storage, or run in production. For images after the running of containers, segmentation policies can be executed automatically or manually for existing images, and rules can be set up for automatic and manual execution.

As the network domains between clusters vary, and the K8S network plug-in operates as the overlay network plug-in by default, the network domain can naturally serve as the security domain between clusters.

Microsegmentation in cloud-native must support IP blocking, both in a way that supports zero-trust and Label blocking as well as IP configuration.

The design of cloud-native security platforms is based on this principle. Meanwhile, we should not only deploy a dedicated cloud-native security firewall but also take full advantage of traditional security firewalls to protect security.

The prevention of zero-day attacks can be modeled based on the following five factors:

· Learning in-container behaviors to build a security model;

· Analyze the product risk event list based on events such as file accesses, abnormal network connections, and system calls outside the model when detected;

· Team members must respond and take responsibility for the prevention of abnormal behavior or for correcting errors as soon as possible;

· Develop models in the test environment and apply them directly to the production environment without the need to re-learn them;

· Zero-vulnerability, supporting 0-day mitigation.

During a particular learning cycle,the process starts and stops, and the files that are read and written by the process are required to be learned. Suppose that, after the learning cycle, a brute force attack is launched on a database, causing a large number of network and validation errors in a short period, and it could be directly considered as not meeting the learning specifications.

The first four factors above learn the behavior of running containers, while the last one predicts the state of running containers before they run. In addition to this, historical containers,as well as all previous containers, keep a record of the learning process in order to prevent zero-day attacks in the future.


Guest Introduction

Mr. Bai Liming is a technical partner with Dosec.cn and was previously responsible for the cloud-native platform for OurGame.com. He has over seven years of experience in DevSecOps R&D and is one of the key developers of the first cloud-native security product in China. Aside from this, he was also a key contributor to the establishment of "Classified Protection of Cybersecurity 2.0" issued by the Ministry of Public Security and the white paper on Cloud Native Architecture Security from the China Academy of Information and Communications Technology (CAICT).

責任編輯:龐桂玉 來源: 51CTO
相關推薦

2022-08-30 20:45:41

cloudcloud natieducation

2022-08-31 16:15:56

AIOpsCloud Nati

2022-08-31 14:58:48

data lakescloud natibig data

2023-02-07 09:24:28

2016-01-22 13:12:38

云計算云原生云原生應用

2015-09-22 14:19:56

Cloud NativDevOps持續交付

2019-12-10 18:20:41

云計算軟件

2022-08-31 09:31:20

AlibabaKoodinatorcontainers

2022-03-24 10:25:17

網絡安全威脅情報防火墻

2023-07-19 10:09:18

架構倉庫SSD

2009-12-24 10:16:19

Systems Dir

2016-04-07 22:11:13

時速云Cloud NativDocker

2017-07-11 08:38:38

TiDB數據庫分布式

2014-10-15 14:07:40

思科UCS

2017-06-29 14:29:46

互聯網

2011-03-11 09:34:23

VMware vClo

2012-08-16 09:32:19

VMware

2009-09-25 15:31:24

Hibernate架構

2021-05-20 09:23:26

零信任

2017-08-02 09:37:32

NFVCloud Nativ虛擬機
點贊
收藏

51CTO技術棧公眾號

91极品尤物在线播放国产| 亚洲自拍高清视频网站| 级毛片内射视频| 精品亚洲美女网站| 亚洲视频一二三区| 国产精品推荐精品| 99re热视频| 欧美aa国产视频| 亚洲精品午夜精品| 樱花草www在线| 精精国产xxxx视频在线野外 | 国产欧美精品一区二区三区-老狼| 熟女av一区二区| 日韩福利视频一区| 欧美日韩成人一区| 国产精品自拍片| 久操免费在线| 久久久久久影视| 国产成人一区二区三区小说| 日本成人在线不卡| 午夜av免费在线观看| 日韩精彩视频在线观看| 欧美日韩国产91| 欧美日韩中文字幕视频| 国产精品白浆| 91精品国产日韩91久久久久久| 欧美日韩亚洲第一| 欧美xxxx黑人又粗又长| 国产精品视频一二三区| 国产一区二区三区四区hd| 91福利在线观看视频| 久久久亚洲人| 3344国产精品免费看| 国产69精品久久久久久| 91成人在线观看喷潮教学| 欧美日韩欧美| 国产拍揄自揄精品视频麻豆| 精品国产一二| 亚洲av综合色区无码一二三区 | 欧美精品videos| 久久一级免费视频| 国产不卡一二三区| 亚洲人a成www在线影院| 五十路六十路七十路熟婆| 国产精品一站二站| 欧美日本视频在线| 一区二区三区视频在线观看免费| 天堂√中文最新版在线| 亚洲狠狠爱一区二区三区| 国产资源第一页| 黄网站免费在线播放| 国产精品国产成人国产三级| 亚洲国产精品久久久久婷婷老年| 免费国产在线观看| 久久午夜色播影院免费高清| 久久青青草综合| 五月婷婷伊人网| 99久久精品国产网站| 狠狠色综合网站久久久久久久| 丰满人妻一区二区三区无码av | 不卡一区二区三区四区五区| 999av视频| 国产精品亚洲а∨天堂免在线| 亚洲精品欧美日韩专区| www.黄色一片| 成人爱爱电影网址| 久久综合九色欧美狠狠| 日本啊v在线| 国产亚洲精品资源在线26u| 三级三级久久三级久久18| 777电影在线观看| 中文字幕一区二区不卡| 97在线免费视频观看| 久久99亚洲网美利坚合众国| 午夜精品123| 六月丁香婷婷激情| www.国产精品| 91精品一区二区三区在线观看| 永久av免费在线观看| 粉嫩久久久久久久极品| 欧美精品一区二| av小说在线观看| 日韩欧美网址| 欧美福利在线观看| 成人免费看片98欧美| 日韩av电影一区| 亚洲影影院av| 丝袜视频国产在线播放| 国产精品美女久久久久久久久久久| 吴梦梦av在线| 蜜桃麻豆av在线| 欧美日韩精品综合在线| 农村末发育av片一区二区| 亚洲精品亚洲人成在线| 日韩视频亚洲视频| 日韩污视频在线观看| 麻豆91精品91久久久的内涵| 操一操视频一区| 黄色av网站在线| 亚洲人123区| 无码人妻丰满熟妇区96| 亚洲精品大全| 亚洲欧美激情四射在线日| 国语对白在线播放| 久久亚洲不卡| 国产乱子伦精品| 免费黄色在线看| 色综合久久六月婷婷中文字幕| 黄色aaaaaa| 国产一区二区三区网| 欧美成人午夜免费视在线看片 | av伦理在线| 欧美疯狂性受xxxxx喷水图片| 色播五月激情综合网| www.精品在线| 亚洲人挤奶视频| 久久成年人视频| 亚洲中文字幕一区二区| 91美女精品福利| 日本免费a视频| 亚洲伊人精品酒店| 亚洲视频第一页| 日韩黄色精品视频| 国产一区二区精品久久91| 欧美日韩综合网| 久久久男人天堂| 精品电影一区二区三区| 永久久久久久久| 麻豆91在线播放| 视频一区视频二区视频| 亚洲三级欧美| 亚洲成人亚洲激情| 紧身裙女教师波多野结衣| 香蕉久久久久久久av网站| 亚洲aa在线观看| 在线观看精品一区二区三区| 黑丝美女久久久| 精品久久久久久无码人妻| 天海翼亚洲一区二区三区| 欧美日韩国产成人| 国产精品玖玖玖| 中文字幕一区二区三区四区 | 屁屁影院ccyy国产第一页| av日韩国产| 日韩一级成人av| 99热6这里只有精品| 丝袜诱惑亚洲看片| 欧美不卡1区2区3区| 国产精品一二三产区| 日韩三级中文字幕| 青青草手机视频在线观看| 国产一区二区三区在线观看免费| 一区二区三区四区国产| 91p九色成人| 国产亚洲aⅴaaaaaa毛片| 免费的毛片视频| 久久精品一区二区三区不卡牛牛| 日韩av黄色网址| 日韩欧美四区| 日韩av免费一区| 国产综合在线观看| 在线免费视频一区二区| 精品无码国产污污污免费网站| 日韩在线卡一卡二| 亚洲高清资源综合久久精品| 日韩深夜福利网站| 免费91在线视频| 亚洲AV无码成人片在线观看| 亚洲国产裸拍裸体视频在线观看乱了| 岛国精品一区二区三区| 国产欧美午夜| 偷拍视频一区二区| 国产精品一区二区精品| 欧美精品videossex88| 人妻少妇精品无码专区久久| 色综合久久99| 中文字幕资源站| 丰满放荡岳乱妇91ww| 黄页免费在线观看视频| 经典一区二区| 国产成人精品最新| 麻豆app在线观看| 欧美日韩精品一区二区天天拍小说 | 欧美第一黄色网| 96亚洲精品久久久蜜桃| 国产精品不卡视频| 深夜视频在线观看| 羞羞视频在线观看欧美| 夜夜爽99久久国产综合精品女不卡| 国产精品99久久免费| 久久久亚洲天堂| wwwxxx在线观看| 日韩精品一区二区三区中文不卡| 在线观看日本视频| 亚洲欧美视频在线观看| 中国黄色片视频| 亚洲天堂一区在线| 国产精品美女| 中文字幕av日韩精品| 成人三级av在线| 国产精品入口福利| 久久www人成免费看片中文| 亚洲视频网站在线观看| 国产精品视频无码| 亚洲韩国一区二区三区| 日本黄色激情视频| 99精品欧美一区二区蜜桃免费| 热久久精品免费视频| 欧美全黄视频| 视频三区二区一区| 国产伦精品一区二区三区在线播放 | 精品中文视频在线| 国产v在线观看| 欧美亚洲国产一区在线观看网站 | 色爱区综合激月婷婷| 欧美日韩一级在线观看| 国产精品天天看| 国产ts在线播放| 成人小视频在线观看| 中文字幕日韩综合| 日韩经典中文字幕一区| 久久久999视频| 亚洲国产综合在线看不卡| 亚洲欧洲另类精品久久综合| 中文有码一区| 免费成人av网站| 国产精品久久久久久久久久白浆| 91色精品视频在线| 先锋影音一区二区| 国产精品久久久久免费a∨大胸| 少妇淫片在线影院| 国模吧一区二区三区| 少妇视频在线| 九九热在线精品视频| 成人日韩欧美| 久久久电影免费观看完整版| 日本在线播放| 北条麻妃久久精品| 日本高清中文字幕在线| 亚洲欧美制服中文字幕| 亚洲 美腿 欧美 偷拍| 精品盗摄一区二区三区| 亚洲国产成人精品一区二区三区| 91精选在线观看| 91成人一区二区三区| 51久久夜色精品国产麻豆| 国产精品欧美激情在线| 欧美电影一区二区| 国产偷拍一区二区| 日韩欧美国产综合一区| 亚洲黄色在线观看视频| 亚洲第一区在线观看| 亚洲色图 校园春色| 精品一区二区三区电影| 黄色av网址在线免费观看| 国产亚洲欧美日韩一区二区| 91网在线播放| xxx成人少妇69| 91蜜桃在线视频| 国内自拍欧美激情| 范冰冰一级做a爰片久久毛片| 日韩av黄色在线观看| 超碰这里只有精品| 91精品久久久久久久久青青| 日本伊人久久| 黄色99视频| 成人情趣视频网站| 99久re热视频精品98| 亚洲国产精品第一区二区| 久久久噜噜噜www成人网| 日本不卡高清视频| 日韩va在线观看| 成人做爰69片免费看网站| 风间由美一二三区av片| 欧美国产日本韩| www深夜成人a√在线| 亚洲国产日韩a在线播放性色| 天天综合网久久综合网| 欧美日韩综合在线| www.中文字幕| 亚洲视频在线播放| 超碰个人在线| 456国产精品| 国产精品区在线| 九色综合国产一区二区三区| 久久无码专区国产精品s| 久久久久久久综合狠狠综合| 四虎永久免费地址| 午夜欧美视频在线观看| 日本视频www色| 精品免费视频.| 波多野结衣在线网站| 欧美激情网友自拍| 国产麻豆一区| 国产视频一区二区不卡| 日韩av自拍| 日韩伦理在线免费观看| 毛片av中文字幕一区二区| 先锋资源av在线| 日韩美女久久久| 亚洲精品www久久久久久| 欧美三级乱人伦电影| 四虎成人免费在线| 久久的精品视频| 日韩精品三区| 激情小说综合网| 欧美在线高清| 日日噜噜夜夜狠狠| 99re视频这里只有精品| 日本黄色小说视频| 欧洲中文字幕精品| 午夜在线视频免费| 欧美日韩高清区| 亚洲91在线| 日韩妆和欧美的一区二区| 日韩图片一区| 欧美体内she精高潮| 国产欧美一区二区三区在线看蜜臀| 国产乡下妇女做爰| 欧美一二三在线| 天天在线视频色| 国产精品爱久久久久久久| 欧美变态挠脚心| 丁香婷婷综合激情| 国产九色精品成人porny | 日韩一区欧美一区| 无码人妻精品一区二区三区9厂 | 国产日本欧美视频| 精品在线99| 三上悠亚久久精品| 粉嫩av亚洲一区二区图片| 91香蕉一区二区三区在线观看| 欧美色图在线观看| 成人精品一区二区三区免费| 琪琪第一精品导航| 日本中文字幕在线一区| 精品无码一区二区三区爱欲| 国产高清成人在线| 免费日韩在线视频| 日韩视频在线你懂得| 91网址在线观看| 亚洲伊人久久大香线蕉av| 亚洲国产一区二区三区在线播放| 免费一级特黄录像| 久久久久综合网| 成人毛片一区二区三区| 亚洲美女喷白浆| 亚洲精品一区| 欧美一区二区三区精美影视| 亚洲免费网址| 亚洲精品国产一区黑色丝袜| 欧美在线观看视频一区二区| 男操女在线观看| 国产精品久久久久久久久久久久久久| 国产精品嫩草影院在线看| 久久精品中文字幕免费mv| av小说天堂网| 欧美激情中文网| 日本成人中文| 国产亚洲天堂网| 欧美韩日一区二区三区四区| 久草热在线观看| 日韩视频欧美视频| 999国产精品一区| 欧美日本视频在线观看| 国产午夜亚洲精品午夜鲁丝片| 一区二区自拍偷拍| 欧美精品在线播放| 久久综合五月婷婷| 国产一级不卡毛片| 日韩理论片中文av| 亚洲精品一区二区三区不卡| 国内精品小视频| 九九综合在线| 久久久精品高清| 亚洲成人av资源| 国产三级在线免费| 91最新在线免费观看| 999亚洲国产精| 欧美黄色激情视频| 欧美一卡二卡三卡| 在线看片福利| 欧美 另类 交| 97精品电影院| 一级片视频播放| 91国内在线视频| 久久国产成人精品| 无码人妻一区二区三区免费n鬼沢| 五月婷婷综合网| 日本免费中文字幕在线| 国产日韩欧美一区二区| 青青草国产精品97视觉盛宴| 久久久久久久中文字幕| 亚洲午夜精品视频| 午夜视频一区二区在线观看| 国产乱子夫妻xx黑人xyx真爽| 日韩毛片高清在线播放| 日本亚洲一区| 99高清视频有精品视频| 奇米精品一区二区三区在线观看一|