精品欧美一区二区三区在线观看 _久久久久国色av免费观看性色_国产精品久久在线观看_亚洲第一综合网站_91精品又粗又猛又爽_小泽玛利亚一区二区免费_91亚洲精品国偷拍自产在线观看 _久久精品视频在线播放_美女精品久久久_欧美日韩国产成人在线

Tech Director of Dosec.cn Discusses Best Practices for Cloud-native Security Architecture De

原創 精選
Techplur
In this article, we invited Mr. Bai Liming, technology director of Dosec.cn, to present some best practices for building cloud-native security architectures based on the company's expertise and experi

With its efficient, stable, and responsive features, cloud-native has become a key driver of digital innovation in enterprises. At the same time, security risks are also increasing in cloud-native environments, prompting enterprises to seek appropriate architecture design solutions.

In this article, we invited Mr. Bai Liming, technology director of Dosec.cn, to present some best practices for building cloud-native security architectures based on the company's expertise and experience.


1. Development of cloud-native

The concept of cloud-native was first introduced in 2013 by Pivotal, a company recognized for its multi-cloud application platform Cloud Foundry. Two years later, Matt Stine, Pivotal's technical product manager, defined the five principles of cloud-native architecture in his book "Migrating to Cloud-Native Application Architecture":

Compliant with 12-factor apps;

Microservice-oriented architecture;

Self-Service Agile Architecture;

API-based collaboration;

Antifragile.

According to the CNCF Cloud Native Definition v1.0, which was approved on June 11, 2018, cloud-native should have the following characteristics:

· Containers;

· Service meshes;

· Microservices;

· Immutable infrastructure;

· Declarative APIs.

Applications that meet all five of the characteristics above will be cloud-natives ones.

Throughout the evolution of cloud-native, containerization has further simplified the capabilities and features of the operating system. Cloud-native operating systems were developed to meet the immutable infrastructure requirement. It features a streamlined kernel, retains only container-related dependency libraries, and uses a container user end as a package manager.

In cloud-native operating systems,all processes must run in containers. As no application can be installed on the OS host, the OS becomes completely immutable, known as the immutable infrastructure, and is expected to be the future of OS development.

In the past, applications were run on physical machines, but as the infrastructure evolved, they moved to virtual machines and later to containers. In the era of cloud computing, serverless architecture seems to be the newest fad.

A physical machine's life cycle is typically measured in years and terminated after a year or five. For virtual machines, the unit of measurement is the month.

With the advent of containerization,each update requires rebuilding a new container; as a result, container lifecycles are measured in days. While serverless computing progresses,function virtualization will be measured in minutes.

The emergence of containerization accelerated the process of standardizing containers. Containers and DevOps complement each other, and application container platforms should follow a DevOps development model to speed up the release process. Generally,containerization promotes DevOps, and containers rely on DevOps for speeding up iteration.

With containers as the unit of analysis, cloud-native and services represent the network boundary.Cloud-native has no concept of IP addresses as they are all dynamic, and we cannot configure their IP addresses on conventional firewalls. With cloud-native, the container services are updated every day, so the IP address is changed accordingly, and the original network policies are no longer valid.

In the era of physical machines, it is more challenging to deploy physical devices, so running several applications on one physical machine is common. For virtual machines, individual services were usually divided into a single virtual machine to improve service availability. Currently, service interfaces are increasingly dependent upon micro-services, so they must be adapted into microservice architectures.

Here take Weibo (a Chinese microblogging site similar to Twitter) as an example: when there is a hot event, both physical and virtual machines require a more extended build period in hours to allow business recovery. In a containerized scenario, the container begins to operate in seconds, whereas physical and virtual machines start up much more slowly. Therefore, since Weibo adopted a container architecture, hot events are rarely the cause of downtimes. Moreover, this can also be attributed to the self-healing and dynamic scaling capabilities of the K8S platform.

Docker was commonly equated with containers during the early days of container runtimes. Similar to containers,which have four modules, Docker includes four interfaces. Docker, however, is a complete development kit, and K8S will only use the runtime. Therefore, to improve operational efficiency, K8S gradually stopped supporting Docker Shim in version 1.20 and switched to using Docker and Containerd instead.

However, neither Containerd nor Docker provides comprehensive security features. In Cri-o, the needs for relative security can be met, and there is no daemon. Each Cri-o process consists of a parent and child process, which can run as a service. In addition, the next aspect of containers to be considered is the security of the underlying infrastructure, including the technological containerization of security.


2. Risks associated with cloud-native

A cloud-native architecture needs to address five main security concerns:

· Image security

· Image repo security

· Cluster component security

· Container network risks

· Microservices risks

The risks associated with image security are by far the most extensive. Unlike infrastructure security,cloud-native focuses more on performance optimization and infrastructure containerization. At the moment, 51% of DockerHub images have high-risk vulnerabilities, while 80% have low- to medium-risk vulnerabilities. It is common for enterprises to download images from DockerHub.

As for image repositories,enterprises cannot upload all of their R&D and business images to a public repository but must store the source code in their own repository. However,enterprise repositories can also contain vulnerabilities that hackers may exploit,leading to the replacement of images in the repository. It is possible that the actual image pulled from the node is from a hacker with a Trojan horse.

Cluster components such as Docker,K8s, OpenShift, and Cri-o have vulnerabilities and 45 vulnerabilities in other container runtimes such as Containerd and Kata Container. Vulnerabilities associated with cluster components are relatively few, but they do exist.

A hacker who exploits these vulnerabilities will also have access to other containers within the cluster.Physical firewalls can only prevent traffic emanating from outside of the cluster, however, attacks that originate inside the firewalls, such as those caused by K8S overlays and underlays, are not covered by firewalls, hence posing an internal network risk to clusters.

The vulnerability of business images can also lead to a second problem: the vulnerability of the built-in image components. If a developer uses an API or a vulnerable development framework,this type of security problem can arise when the developer packages the components into an image. Previously, the widely impacting Spring Framework 0-day was an infrastructure vulnerability that affected approximately 90% of Chinese Internet enterprises. R&D is typically responsible for introducing this type of microservices risk.


3. Design of a cloud-native security architecture

In the past, infrastructures were primarily protected by firewalls and physical security measures. For the computing environment of containers, container runtime security and image security require professional protection. Moreover, regarding the security of containers, it involves the discovery of microservices and the protection of serverless applications.

A cloud-native scenario requires the R&D security system to be integrated, which differs from a traditional security system. Research and development personnel should be involved in the security design process, and they should always pay attention to the cloud-native data security in R&D and the permissions related to security management.

As part of Dosec.cn's container security solution, there are many built-in and machine behavior learning policies, as well as other disposal policies and events.

Auditing orchestration files is one of the features. It can read all the existing Dockerfiles, Yaml files, and orchestration files directly from the developer's code repository. By inferring syntax from the Dockerfile file, it can detect errors in the command.

In the event that an issue is discovered during the audit, it will be reported to R&D team, and the image building will be disabled. If there is no problem, modifications will be immediately conducted, and the image will be generated once the changes have been made. Next, the image will be reversed into a Dockerfile and compared. A warning will be issued if any tampering with Dockfile is detected.

Moreover, the container business running on the image will also be reversed in order to check whether the image on which the container depends is correct and whether the process running in the image matches the process packaged in the Dockerfile. An alert will be raised if there is an inconsistency found, reporting that the business may be at risk.

The cloud-native approach is immutable, and the underlying OS and image are also included in the immutable infrastructure, so the image is also immutable. An image is built according to the Dockerfile, and the running containers are associated with the image.

Another feature includes the ability to read Yaml files directly from the code repository and to control their permissions. A warning will be raised if there is any deprecated and incorrect syntax, high-risk commands, or other dangerous parameters in the Yaml file. The purpose is to link security, O&M, and R&D teams. It is essential that a cloud-native security strategy is developed in concert with the operational team, developers, and security personnel and should never be solely the responsibility of the security department.

A range of open-source image component scanning tools are available on the market. Currently, Dosec.cn's Jingjie Container Security Platform is available in both open-source and commercial editions, and the main difference is the custom rules and vulnerability library. Open-source vulnerability libraries are based on the open-source CBE vulnerability libraries, which support the Chinese vulnerability database CNNVD. CNNVD requires cooperation, and ordinary open-source vendors may not obtain this database. This is one of the key differences between open-source and commercial editions.

Some custom features are available only in the commercial edition, such as trusted image, base image identification, and host image scanning. There are always security risks associated with image repositories, and we need to scan image repositories for vulnerabilities to build security capabilities within the enterprise.

Furthermore, Dosec.cn has been involved with Harbor for its vulnerabilities, so it has some advantages.

Components of the cluster are also at risk. To find the cluster components at stake, assembling the cluster itself and comparing it with the vulnerability database and the vulnerable version is necessary. Meanwhile, version matching would not work for API interfaces and permission vulnerabilities, but POC tests would be required to determine the risks associated with all cluster components.

By scanning each component's configuration in clusters can scan the permission of configuration. In the early versions of K8S, authentication permissions were not enabled by default, but now it defaults to HTTPS.

Moreover, features such as whether audit logs are turned on, need to be configured based on cluster security,along with compliance check baselines to be scanned.

With cloud-native microservices, the service split will lead to exponential growth in scale, which requires automatic discovery of microservices by security software and identification of the types of services, allowing automatic vulnerability scanning. This method is very labor-saving.

Two methods can be used to detect the in-container security after running. The first is learning and standardizing all the behaviors of containers. Meanwhile, reads/writes on container files, process start-ups and shutdowns, and access calls will be captured and recorded in the behavior model. Accordingly, all the traffic of container running will be considered normal, while the other traffic disposed of will be treated as an exception.

Learning takes time, however, and if the learning process encounters attacks or executes, the results will be biased. A policy can be built into the attack model that will exclude behaviors when they are found to violate the policy. It can be combined with machine learning to protect against zero-day attacks while preventing attacks during the learning process. Blacklisting policies integrated into the system enable it to achieve a perfect closed-loop of machine runtime security testing. This seems to be the best practice for container runtime security at the moment.

Microsegmentation in cloud-native is required to achieve the following features: First, it must enable visualization of access relationships. Inherently, cloud-native segmentation meets the zero trust requirement. K8s does not have an IP concept and relies solely on Labels.These labels are tagged by the R&D and business teams, who will utilize them to implement microsegmentation dynamically. Thus, it is necessary to automatically generate and rehearse the container's policy based on the learning relationship.

When the policy learning is complete and confirmed, it will enter rehearsal mode, where the rehearsal time can be set. The normal traffic flow will not be blocked for a certain period. In the event that traffic flow is found to be affected by the policy, it will be warned.In this case, the company's R&D or business team can make a judgment in person, and if the business traffic is safe, the machine behavior learning model will be edited in order to exclude it.

If no more exceptions are found after a certain period, the trained policy will not affect regular traffic patterns and can effectively defend against attacks. By clicking policy execution, the automatic policy can now be applied to the production environment without affecting it.

Lastly, in cloud-native environments, the security of its own software platform must comply with the three-layer architecture: first, there is the management layer, which must be decoupled from the task center so that all clusters are convergent.

If the image repository contains too much data, the scanning can be integrated directly with the repository image.Instead of relying on network bandwidth to pull the image, it could scan directly while reading the storage path. In this manner,network utilization,as well as disk IO usage, can be significantly reduced, enabling direct reading. Currently, this is the most influential architecture design for container security.


4. Best practices in cloud-native security

There are three main components of DevSecOps design in cloud-native environments. First, there is the construction phase. Dosec.cn provides a golden image repository where all the images are reinforced. R&D personnel can directly pull and build business images from the golden repository.

Having cooperated with CNNVD,Dosec.cn's vulnerability library will be updated directly following synchronization. Additionally, Dosec.cn will maintain its golden image repository in real-time according to the daily vulnerability updates. Moreover,Dosec.cn has its own scanner and security researchers investigating the latest vulnerabilities and zero-day attacks.

The recommendation for enterprises is to maintain two image repositories and set trust judgments for the production image repositories in the cluster. Thus, hackers are prevented from entering the clusters and pulling down business containers directly.

Image scanning is used for business development to scan the configuration of the application layer, and if a vulnerability is discovered, it blocks synchronization. A trust judgment can be set up in the production environment that incorporates all conditions, such as whether the enterprise is using its own environment image repository.

Using the platform, it is also possible to assess the risks associated with vulnerabilities in cluster components and microservices. Among other things, scanning and analyzing vulnerability in images can filter out images so that each image can be identified as its creator, technical impact components, software component analysis, source code scanning, development security scanning, and application vulnerability scanning.

In the event that a container security platform detects an attack, it will provide overall security prevention prior to, during, and after the event. A full evaluation and reinforcement of clusters are conducted beforehand, and all behavior learning will start after the enhancement. When an event occurs, it will check for and implement zero-day defenses, with real-time notifications sent out.

When an attack is detected, the image running should be terminated first. The image will not be uploaded during the R&D, downloaded to storage, or run in production. For images after the running of containers, segmentation policies can be executed automatically or manually for existing images, and rules can be set up for automatic and manual execution.

As the network domains between clusters vary, and the K8S network plug-in operates as the overlay network plug-in by default, the network domain can naturally serve as the security domain between clusters.

Microsegmentation in cloud-native must support IP blocking, both in a way that supports zero-trust and Label blocking as well as IP configuration.

The design of cloud-native security platforms is based on this principle. Meanwhile, we should not only deploy a dedicated cloud-native security firewall but also take full advantage of traditional security firewalls to protect security.

The prevention of zero-day attacks can be modeled based on the following five factors:

· Learning in-container behaviors to build a security model;

· Analyze the product risk event list based on events such as file accesses, abnormal network connections, and system calls outside the model when detected;

· Team members must respond and take responsibility for the prevention of abnormal behavior or for correcting errors as soon as possible;

· Develop models in the test environment and apply them directly to the production environment without the need to re-learn them;

· Zero-vulnerability, supporting 0-day mitigation.

During a particular learning cycle,the process starts and stops, and the files that are read and written by the process are required to be learned. Suppose that, after the learning cycle, a brute force attack is launched on a database, causing a large number of network and validation errors in a short period, and it could be directly considered as not meeting the learning specifications.

The first four factors above learn the behavior of running containers, while the last one predicts the state of running containers before they run. In addition to this, historical containers,as well as all previous containers, keep a record of the learning process in order to prevent zero-day attacks in the future.


Guest Introduction

Mr. Bai Liming is a technical partner with Dosec.cn and was previously responsible for the cloud-native platform for OurGame.com. He has over seven years of experience in DevSecOps R&D and is one of the key developers of the first cloud-native security product in China. Aside from this, he was also a key contributor to the establishment of "Classified Protection of Cybersecurity 2.0" issued by the Ministry of Public Security and the white paper on Cloud Native Architecture Security from the China Academy of Information and Communications Technology (CAICT).

責任編輯:龐桂玉 來源: 51CTO
相關推薦

2022-08-30 20:45:41

cloudcloud natieducation

2022-08-31 16:15:56

AIOpsCloud Nati

2022-08-31 14:58:48

data lakescloud natibig data

2023-02-07 09:24:28

2016-01-22 13:12:38

云計算云原生云原生應用

2015-09-22 14:19:56

Cloud NativDevOps持續交付

2019-12-10 18:20:41

云計算軟件

2022-08-31 09:31:20

AlibabaKoodinatorcontainers

2022-03-24 10:25:17

網絡安全威脅情報防火墻

2023-07-19 10:09:18

架構倉庫SSD

2009-12-24 10:16:19

Systems Dir

2016-04-07 22:11:13

時速云Cloud NativDocker

2017-07-11 08:38:38

TiDB數據庫分布式

2014-10-15 14:07:40

思科UCS

2017-06-29 14:29:46

互聯網

2011-03-11 09:34:23

VMware vClo

2012-08-16 09:32:19

VMware

2009-09-25 15:31:24

Hibernate架構

2021-05-20 09:23:26

零信任

2017-08-02 09:37:32

NFVCloud Nativ虛擬機
點贊
收藏

51CTO技術棧公眾號

黄色成人91| 97品白浆高清久久久久久| 国产精品免费网站在线观看| 亚洲一区二区三区香蕉| 日韩精品一区二区不卡| 欧美影院三区| 91精品婷婷国产综合久久| 黄色国产一级视频| 欧美尤物美女在线| www.亚洲在线| 91中文在线视频| 亚洲欧美一二三区| 亚洲性人人天天夜夜摸| 丝袜美腿亚洲一区二区| 538国产视频| 欧美特黄不卡| 欧美在线不卡一区| 国产美女主播在线播放| 秋霞成人影院| 国产免费成人在线视频| 国产一区二区三区黄| 国产美女明星三级做爰| 老司机精品视频网站| 国内精品久久久久久久| 91传媒免费观看| 成人精品视频| 亚洲精品天天看| 国产一精品一aⅴ一免费| 成人免费一区| 色哟哟一区二区三区| 福利视频一二区| 午夜影院免费在线| 成人免费小视频| 欧美在线3区| 日韩精品系列| 91啪亚洲精品| 麻豆精品传媒视频| 深夜福利视频网站| 成人精品亚洲人成在线| 91精品视频在线免费观看| 91麻豆精品在线| 日韩—二三区免费观看av| 97超碰色婷婷| 日韩福利片在线观看| 亚洲午夜精品久久久久久app| 久久精品国产精品亚洲| 精品一区二区在线观看视频| 不卡一区2区| 一区二区欧美在线| 蜜桃久久精品成人无码av| 久久91成人| 国产一区二区三区直播精品电影| 日韩乱码人妻无码中文字幕久久| 黄色欧美网站| 亚洲精品美女久久| 成人免费毛片日本片视频| 久久91在线| 亚洲精品999| 亚洲熟女乱综合一区二区三区| www.国产精品一区| 亚洲国产精久久久久久| www国产视频| 亚洲专区视频| 在线观看欧美日韩| 国产免费美女视频| 欧美日韩综合| 97香蕉超级碰碰久久免费的优势| 国产成人精品片| 久久一二三四| 成人www视频在线观看| 国产露脸91国语对白| 国产传媒久久文化传媒| 国产亚洲欧美一区二区| 欧美拍拍视频| 国产精品美女www爽爽爽| 天天在线免费视频| aa国产成人| 色综合久久久久网| 天堂av手机在线| 精品丝袜久久| 中文字幕在线精品| 毛片a片免费观看| 亚洲免费在线| 国产主播精品在线| 色屁屁草草影院ccyycom| 久久久久国产一区二区三区四区| 亚洲欧洲精品在线观看| 日本片在线观看| 91福利资源站| 91在线第一页| 影视先锋久久| 欧美激情视频在线| 看黄色一级大片| 国产69精品久久久久777| 欧美国产综合视频| av在线免费播放| 色av一区二区| 影音先锋资源av| 青青一区二区三区| 91禁外国网站| 一级特黄色大片| 99久久精品免费看| 在线观看污视频| 久久91导航| 精品国产一区二区精华| 一级二级黄色片| 国产人成精品一区二区三| 国产精品自在线| 水莓100在线视频| 亚洲精品欧美二区三区中文字幕| aa视频在线播放| 精品国产三级| 中文字幕日韩电影| 久久久久女人精品毛片九一| 国产东北露脸精品视频| 永久域名在线精品| 人人视频精品| 亚洲精品国偷自产在线99热| caoporn91| 六月丁香综合在线视频| 欧美大陆一区二区| 91桃色在线| 欧美第一区第二区| 欧美成人777| 久久精品免费观看| 亚洲欧洲精品一区二区| 精品亚洲美女网站| 亚洲欧美在线x视频| 日韩精品在线不卡| 成人在线综合网| 久久久久久久久网| 成人在线啊v| 日韩日本欧美亚洲| 亚洲资源在线播放| 国产精品美女一区二区三区| 无人在线观看的免费高清视频| 欧洲亚洲视频| 91av国产在线| 亚洲色大成网站www| 图片区小说区区亚洲影院| 国产a√精品区二区三区四区| 99久久婷婷| 国产日韩亚洲欧美| 成人影院www在线观看| 欧美日韩一本到| 99久久久无码国产精品不卡| 开心九九激情九九欧美日韩精美视频电影 | 午夜啪啪免费视频| 亚洲欧洲二区| 久久综合网hezyo| 国内精品国产成人国产三级| 亚洲精品综合在线| 污污免费在线观看| 宅男噜噜噜66国产日韩在线观看| 久久精品美女| 四虎影视4hu4虎成人| 有码中文亚洲精品| 91精品在线视频观看| 综合色天天鬼久久鬼色| 欧美专区第二页| 亚洲天堂成人| 欧美午夜免费| 福利一区和二区| 另类图片亚洲另类| 欧美一级在线免费观看| 欧美性猛交xxxx免费看漫画| 最新中文字幕av| 激情图区综合网| 成人午夜视频在线观看免费| 天美av一区二区三区久久| 国产精品福利久久久| 麻豆传媒视频在线| 亚洲国产成人精品久久久国产成人一区| 国产精品成人网站| 久久久久88色偷偷免费| 日本高清久久久| 91久久在线| 色播五月综合| 中文字幕av一区二区三区四区| 8x海外华人永久免费日韩内陆视频| 黄色av免费在线观看| 欧美丰满高潮xxxx喷水动漫| 久久精品视频8| 国产清纯美女被跳蛋高潮一区二区久久w | 亚洲欧美日韩久久久久久| 亚洲综合视频在线播放| 亚洲国产精品综合小说图片区| 女尊高h男高潮呻吟| 美女国产一区二区| 久久久亚洲国产精品| 欧洲杯半决赛直播| 国产日韩精品推荐| 欧美一区二区三区婷婷| 欧美一区亚洲一区| 成码无人av片在线观看网站| 亚洲美女av在线| 国产欧美日韩成人| 日韩欧美福利视频| 麻豆视频在线免费看| 国产欧美日韩另类视频免费观看| 苍井空张开腿实干12次| 麻豆精品国产传媒mv男同| 夜夜添无码一区二区三区| 欧美电影一二区| 麻豆传媒一区二区| 北条麻妃在线一区二区免费播放| 国产精品精品一区二区三区午夜版| 欧美xxx黑人xxx水蜜桃| 中文字幕精品国产| 神马精品久久| 亚洲成人免费网站| 国产喷水福利在线视频| 欧美亚洲精品一区| aaa人片在线| 自拍偷拍欧美精品| 99自拍偷拍视频| 国产人成亚洲第一网站在线播放| 在线视频 日韩| 国产精品免费精品自在线观看| 国产无一区二区| 91精品国产高清91久久久久久 | 国产999在线观看| 国产乱妇乱子在线播视频播放网站| 中文字幕欧美专区| 欧美777四色影视在线 | 疯狂揉花蒂控制高潮h| 国产精品正在播放| 久久婷婷中文字幕| 国内一区二区视频| 在线观看高清免费视频| 日韩电影在线观看电影| 少妇性饥渴无码a区免费| 亚洲小说欧美另类婷婷| 91免费国产精品| 欧美日韩伊人| youjizz.com在线观看| 综合天堂av久久久久久久| 一级黄色录像免费看| 五月婷婷六月综合| 一本一道久久久a久久久精品91| 加勒比久久综合| 日韩电影免费观看在| 国产精品欧美三级在线观看| 欧洲在线视频一区| 成人激情视频| 亚洲一区精品视频| 久久精品久久久| 黄色一级视频播放| 欧美性久久久| 免费在线a视频| 久久国产精品毛片| 欧美日韩亚洲自拍| 精品亚洲国内自在自线福利| 久久国产激情视频| 国产一区二区三区日韩| 日本一区二区三区在线免费观看| 国产麻豆精品在线观看| 亚洲欧美日韩中文字幕在线观看| 国产福利一区在线观看| 亚洲麻豆一区二区三区| 99精品黄色片免费大全| 极品人妻videosss人妻| 国产精品天干天干在观线| 三级黄色免费观看| 一区二区三区欧美日| 奇米影视第四色777| 日本丶国产丶欧美色综合| 中文字幕制服诱惑| 日韩欧美亚洲国产精品字幕久久久| 性中国古装videossex| 亚洲国产小视频| 国产在线一二| 久久天天躁狠狠躁夜夜躁2014| 欧美xxxx黑人又粗又长| 欧美在线激情视频| 日韩成人精品一区二区三区| 国产精品成人一区二区三区| 免费久久精品| 日本一道在线观看| 国产亚洲精品bv在线观看| 小泽玛利亚视频在线观看| 国产精选一区二区三区| 亚洲国产果冻传媒av在线观看| 国产精品视频麻豆| 国产精品成人国产乱| 欧美性xxxxxxxx| 性一交一乱一精一晶| 国产午夜精品一区二区三区| 成人区精品一区二区不卡| 69精品小视频| 午夜精品久久久久久毛片| 精品国产乱码一区二区三区四区 | 91婷婷韩国欧美一区二区| 久久久久亚洲AV成人无在| 亚洲狠狠爱一区二区三区| 中文字幕免费播放| 日韩精品高清在线观看| 免费看a在线观看| 26uuu另类亚洲欧美日本一| 国产精品777777在线播放| 久久精品人人做人人爽电影| 天天天综合网| 国产成人无码一二三区视频| 国产成人综合在线播放| 国产精品无码无卡无需播放器| 无码av免费一区二区三区试看| 国产精品久久久久久69| 亚洲欧美中文另类| 97超碰在线免费| 亚洲一区二区免费| 日韩黄色大片| 国产熟女高潮视频| 91亚洲午夜精品久久久久久| 日韩激情综合网| 欧美天天综合网| 欧美xxx.com| 4p变态网欧美系列| 成人资源在线| 欧美视频在线第一页| 国内精品伊人久久久久av一坑| 熟女俱乐部一区二区| 欧美性生活大片免费观看网址| www香蕉视频| 久热精品视频在线| 欧美三级电影网址| 色播亚洲视频在线观看| 久久久一二三| www.久久av| 日韩欧美国产黄色| 亚州男人的天堂| 亚洲97在线观看| 高清精品视频| av免费观看大全| 岛国av在线一区| 国产在线一二区| 精品剧情v国产在线观看在线| av大片在线| 91嫩草国产在线观看| 欧美 日韩 国产精品免费观看| caoporm在线视频| 国产精品久久久久一区| 亚洲一区 中文字幕| 久久精品99久久久久久久久| 日韩美香港a一级毛片| 尤物国产精品| 国产一区二区导航在线播放| 国产精品视频一区二区在线观看| 欧美久久久久久久久久| 免费在线看黄| 亚洲xxxxx性| 国内精品久久久久国产盗摄免费观看完整版| 在线免费看污网站| 亚洲综合激情网| 三级网站免费观看| 欧美一级高清免费播放| 免费av一区二区三区四区| 国产又猛又黄的视频| 国产精品久久久久婷婷| 国产后入清纯学生妹| 久久久久五月天| 亚洲成人一品| 天天干天天操天天做| 亚洲自拍另类综合| 偷拍自拍在线| 国产精品久久久91| 五月天激情综合网| 最新版天堂资源在线| 色av成人天堂桃色av| 免费超碰在线| 国产伦精品一区二区三区四区免费| 亚洲自拍另类| 刘亦菲国产毛片bd| 亚洲成人久久一区| 色天使综合视频| 欧美视频在线第一页| 久久久久久黄色| jizz中国少妇| 人妖精品videosex性欧美| 欧美高清视频在线观看mv| 国产伦理在线观看| 日本高清不卡一区| 色帝国亚洲欧美在线| 欧美日韩日本网| 国产一区二区伦理片| 青青操免费在线视频| 日韩三级成人av网| 日本在线中文字幕一区| 在线黄色免费看| 偷拍一区二区三区| 黄色网在线播放| 免费国产一区二区| 国产一区二区在线影院| 精品人妻一区二区三区免费看| 日韩在线播放av| 亚洲最大在线| 日本少妇xxx| 欧洲精品中文字幕| 多野结衣av一区| 吴梦梦av在线| 国产喂奶挤奶一区二区三区|