日韩av黄I国产麻豆传媒I国产91av视频在线观看I日韩一区二区三区在线看I美女国产在线I麻豆视频国产在线观看I成人黄色短片

歡迎訪問 生活随笔!

生活随笔

當前位置: 首頁 > 编程资源 > 编程问答 >内容正文

编程问答

HISTORY OF ETHEREUM SECURITY VULNERABILITIES, HACKS AND THEIR FIXES

發布時間:2025/3/15 编程问答 58 豆豆
生活随笔 收集整理的這篇文章主要介紹了 HISTORY OF ETHEREUM SECURITY VULNERABILITIES, HACKS AND THEIR FIXES 小編覺得挺不錯的,現在分享給大家,幫大家做個參考.

A?smart contract?is “a computerized transaction protocol that executes the terms of a contract.”. There are obvious advantages of smart contract system: reduction of expenses and legal collisions, time-saving. Blockchain technology has one enormous stumbling block to be widely adopted. And this is security. Security is a critical issue in the case of smart contracts. Recent hacks of smart contracts raised the issue. These facts help to identify and analyze the vulnerabilities, finding potential solutions.

In this article, we gathered related material on Ethereum vulnerabilities and hacks from different sources. It will be useful both for developers of smart contacts and the researchers. Providing you with the common errors and human mistakes in smart contracts we aim to make a guide of their history and fixes, to promote the verification techniques for a smart contract.

The most mainstream and well-known smart contract was?The DAO, which launched with US$250 million in ICO in May 2016, and then was hacked. This attack affected the further destiny of the Ethereum network remaining trust and security behind Blockchain technology achievements. Subsequent events changed the conception of Ethereum and Blockchain in general. Let’s see how:

?

DAO

  • On June 17, 2006,?the attacker drained approximately 3.5M ETH (~$50M) from the DAO smart contract, collected in an ICO a month earlier. The DAO hack occurred after the token sale had already ended.
  • The attack happened due to a?recursive calling vulnerability. The attacker withdrew Ether from The DAO smart contract multiple times using the same DAO Tokens. In this exploit, the attacker was able to call the split function recursively inside of the split, before the smart contract could update its own balance. There were?two main issues?that made this possible:

?

  • When the DAO smart contract was creating the coders did not take into account the possibility of a recursive call.
  • The fact that the smart contract first sent the ETH funds and then updated the internal token balance.
  • ?

    • The DAO has 663 lines of code (without empty lines and comments) — for roughly 860 commits by 18 different contributors.?Statistics?show, that there are up to 15–50 bugs per 1000 lines of code. Although extensive testing and auditing can significantly reduce this number, it is very hard to bring it down to 0.
    • Therefore, smart contracts should be kept as simple as possible, doubly so when they are made immutable.
    • The experts in the community suggested a soft fork to stop ETH draining.
    • Hence, a solution was worked out by Vitalik Buterin the Ethereum Foundation on?June 17, where he issued a critical update:

    A software fork has been proposed, (with NO ROLLBACK; no transactions or blocks will be “reversed”) which will make any transactions that make any calls/callcodes/delegatecalls that reduce the balance of an account with code hash0x7278d050619a624f84f51987149ddb439cdaadfba5966f7cfaea7ad44340a4ba (ie. the DAO and children) lead to the transaction (not just the call, the transaction) being invalid…

    • Another proposal was in the terms of?infringement the rules and it was more aggressive: the hard-fork, the function of which would have only withdrawn function.?The aim of this?hard-fork?was to ask miners to return all raised tokens to the DAO, refunding smart contract.
    • From this contract, DAO token holders could submit their DAO in order to withdraw ETH at a rate of 1 ETH = 100 DAO.
    • Having heard about the software fork proposal, the hackers stopped the attack.
    • At the same time, there was a spontaneous formation of a Robin Hood Group, who drained the remaining funds of the DAO in order to prevent further hacks. The intention was also to hand the ETH back to its original owners.
    • On July 20, 2016, hard-fork took place. After the hard-fork implementation,?Ethereum Classic was born.

    ?

    KING OF THE ETHER THRONE, RUBIXI AND GOVERNMENTAL SMART CONTRACTS

    To set the scene for the analysis of the security of smart contracts, let’s consider some examples of vulnerabilities, allowing the attackers to steal or tamper the assets. We have found a research paper providing the causes of the Ethereum smart contract vulnerabilities in a taxonomy. It is the work written by Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli ?(Universit`a degli Studi di Cagliari, Cagliari, Italy).

    Let’s review next three smart contracts with such kinds of vulnerabilities:

    • Gasless send:?King of the Ether Throne
    • Exception disorders:?KoET, GovernMental
    • Immutable bugs: Rubixi, GovernMental
    • Stack size limit: GovernMental
    • Unpredictable state: GovernMental
    • Time constraints:?GovernMental

    The whole paperwork you can find?here.

    ?

    KING OF THE ETHER THRONE

    • The “King of the Ether Throne” is a game where players compete for acquiring the title of “King of the Ether”. If someone wishes to be the king, he must pay some ether to the current king, plus a small fee to the contract. Here is a simplified version of the game (with the same vulnerabilities), implemented as the contract KotET:

    • Whenever a player sends?msg.value?ether to the contract, he also triggers the execution of KotET’s fallback. The fallback first checks that the sent ether is enough to buy the title: if not, it throws an exception (reverting the ether transfer); otherwise, the player is accepted as the new king. At this point, a?compensation?is sent to the dismissing king, and the player is crowned. The difference between?msg.value?and the compensation is kept by the contract. The owner of KotET can withdraw the ether accumulated in the contract through?sweepCommission.
    • Apparently, the contract may seem honest: in fact, it is not, because not checking the return code of?send?may result in stealing ether17. Indeed, since send is equipped with a few gas (see “gasless send” vulnerability), the?send?at line 17 will fail if the king’s address is that of a contract with an expensive fallback. In this case, since?send?does not propagate exceptions (see “exception disorder”), the?compensation?is kept by the contract.
    • Now, assume that an honest programmer wants to implement a fair variant of KotET, by replacing?send?with?call?at line 6, and by checking its return code:

    • This variant is more trustworthy than the previous but vulnerable to a denial of service attack. To see why, consider an attacker?Mallory, whose fallback just throws an exception. The adversary calls?unseatKing?with the right amount of ether, so that?Mallory?becomes the new king. At this point, nobody else can get her crown, since every time KotET tries to send the?compensation to Mallory, her fallback throws an exception, preventing the coronation to succeed.

    ?

    RUBIXI

    • Rubixi is a contract which implements a?Ponzi scheme,?a fraudulent investment operation where the operator generates returns for older investors through revenue paid by new investors. Further, the contract owner can collect some fees, paid to the contract upon investments.
    • During the contract elaboration, its primary name?Dynamic Pyramid?was changed to?Rubixi. However, the name of the constructor was not correspondingly changed by the programmers. This function then became invokable by anyone. Due to it, the “immutable bugs” vulnerability was exploited. In such a way, the hack allows an opponent to steal some ether from the contract.
    • The Dynamic Pyramid function sets the owner address; the owner can withdraw his profit via?collectAllFees.

    • After this bug became public, users started to invoke Dynamic Pyramid in order to become the owner, and so to withdraw the fees.

    ?

    GOVERNMENTAL

    • GovernMental’s 1100 ETH jackpot payout was stuck because it used too much gas.
    • GovernMental is another flawed Ponzi scheme. To join the scheme, a participant must send a certain amount of ether to the contract. If no one joins the scheme for 12 hours, the last participant gets all the ether in the contract (except for a fee kept by the owner). The list of participants and their credit are stored in two arrays. When the 12 hours are expired, the last participant can claim the money, and the arrays are cleared as follows:

    • The EVM code obtained from this snippet of Solidity code clears one-by-one each location of the arrays. At a certain point, the list of participants of GovernMental grew so long, that clearing the arrays would have required more gas than the maximum allowed for a single transaction. From that point, any attempt to clear the arrays has failed. Let’s review a simplified version of GovernMental, which shares some of the vulnerabilities of the original contract.

    • The contract Governmental gathers the investments of players in rounds, and it pays back only a winner per round, i.e. the player which is the last for at least one minute. To join the scheme, a player must invest at least half of the jackpot (line 14), whose amount grows upon each new investment. Anyone can invoke?resetInvestment, which pays the jackpot (half of the invested total) to the winner (line 24), and sends the remaining ether to the contract owner. The contract assumes that players are either users or contracts with empty fallback, so not to incur in out-of-gas exceptions during?send.

    Let’s have a look at 3 different attacks to simplified GovernMental:

    Attack #1. This attack exploits the vulnerabilities “exception disorder” and “stack size limit”, and is performed by the contract owner. His goal is not to pay the winner, so that the ether is kept by the contract, and redeemable by the owner at a later time. To fulfil this goal, the owner has to make the send at line?24?fail. His first step is to publish the following contract:

    Then, the owner calls Mallory’s attack, which starts invoking herself recursively, making the stack grow. When the call stack reaches the depth of 1022, Mallory invokes Governmental’s?resetInvestment, which is then executed at stack size 1023. At this point, the?send?at line?24?fails, because of the call stack limit (the second send fails as well). Since GovernMental does not check the return code of?send,?the execution proceeds, resetting the contract state (lines?27-29), and starting another round. The balance of the contract increases every time this attack is run, because the legit winner is not paid. To collect the ether, the owner only needs to wait for another round to terminate correctly.

    Attack #2.?In this case, the attacker is a miner, who also impersonates a player. Being a miner, she can choose not to include in blocks the transactions directed to GovernMental, except for her own, in order to be the last player in the round.

    Furthermore, the attacker can reorder the transactions, such that her one will appear first: indeed, by playing first and by choosing a suitable amount of ether to invest, she can prevent other players to join the scheme (line?14), so resulting the last player in the round. This attack exploits the “unpredictable state” vulnerability, since players cannot be sure that, when they publish a transaction to join the scheme, the invested ether will be enough to make this operation succeed.

    Attack #3. Also, in this case, the attacker is a miner impersonating a player. Assume that the attacker manages to join the scheme. To be the last player in the round for a minute, she can play with the block timestamp. More specifically, the attacker sets the timestamp of the new block so that it is at least one minute later the timestamp of the current block. As discussed along with the “time constraints” vulnerability, there is a tolerance on the choice of the timestamp. If the attacker manages to publish the new block with the delayed timestamp, she will be the last player in the round, and will win the jackpot.

    ?

    HACKERGOLD BUG

    • On January 4, 2017, Zack Coburn submitted a vulnerability?report?on EtherCamp’s implementation of the StandardToken contract.
    • StandardToken.sol contract?vulnerability was found in the?transferFrom()?function:

    • =+?is a vulnerability. In this case, it should be?+=
    • The effect is that 0x2ccc5a059a1bda4c3c3c594516e812a0b15799c9’s balance has been reduced from 5,000,000 HKG to 0.001 HKG.
    • There was recommended a fix by Zack Coburn:
      • Create a new HKG contract that fixes the bug and initializes all balances to what they were before the above transactions.
      • Any dapps that keep track of HKG balances internally (i.e., EtherDelta) need to be taken into account so that people who were holding balances inside such smart contracts get their tokens back.
      • Exchanges and token users will need to be notified about the transition to a new token contract.
    • This kind of bug is commonplace and was made due to a human rather than conceptual mistake. In order to prevent them, the developers should use the right tools for improving and correcting the product.
    • A good solution for this problem to be further prevented is the SafeMath library. Any math operations should be checked and safe.

    ?

    BITHUMB

    • On June 29, 2017, Bithumb exchange discovered a breach. The hackers managed to stole user data and money from Bithumb.
    • The personal information of 31,800 Bithumb website users was grabbed. It included users’ names, mobile phone numbers, and email addresses.
    • The attack was committed not directly to the exchange’s internal network and digital currency wallets, but to a personal computer belonging to an employee.
    • After the credentials have been stolen the hacker started a process voice phishing, where the scammers call up victims one at a time and pose as representatives of Bithumb.
    • The attacker posed as a Bithumb executive and asked the victims to give him an “identification number written on the letter from Bithumb.” The number in question was the victim’s One-Time Password, (OTP) which granted the attacker immediate access to ten million won, worth about US$8,700.
    • The exchange posted a notice on their website stating that “compensation for personal information leakage cases has been decided.”

    ?

    CLASSIC ETHER WALLET

    • On June 30, 2017, the unknown hackers managed to get access to the domain Classic Ether Wallet. They used social engineering in order to mislead the employees of web host 1and1, pretending to be the real domain owners.
    • Having gained control over the domain, the attackers changed the domains’ settings and immediately began to direct users to their server.
    • This attack is called phishing scam.
    • The team immediately started?warning users over Twitter?to stop using the service
    • The users even offered to arrange a DDoS attack on the domain to take it offline, as they found it the fastest way to stop criminals actions.
    • But after a few hours later the Classic Ether Wallet managed to convince Cloudflare to place a phishing warning that will appear to anyone who would try to access the website. The issue was resolved.
    • To stay safe the users could use My Ether Wallet and connect it to the ETC node.
    • Reddit users shared a number of ETC addresses, where their funds were located. Thus, it was possible to calculate the sum in total stolen by the hackers. It was about $ 300,000.
    • In order to reduce the chances to be detected the attackers split these funds among different wallets.

    ?

    AUGUR REP TOKEN

    • Augur’s smart contracts are written in Serpent language
    • On July?13, 2017,?Zeppelin Solutions, a technology company focused on improving blockchain technology, security, and infrastructure, contacted the Augur team to privately notify them about 8 critical severity vulnerabilities in Serpent project.
    • These critical bugs were found through an audit. The critical vulnerability was in the Serpent compiler’s code, not in Augur’s code.
    • According to the?Augur REP Token Critical Vulnerability Disclosure?a few days later, Zeppelin Solutions found one of those critical vulnerabilities affected the?production REP token. In a nutshell, an out-of-bounds write on the token’s?reputation?array allowed an attacker to modify the?creation?timestamp, making it believe the crowdsale was still ongoing and disabling all token transfers. This critical severity vulnerability, if exploited, could have halted the whole REP economy, worth over $200 million.
    • First,?Serpent contracts can overwrite storage locations when accessing arrays out of bounds. This means that if a Serpent contract attempts to access an array at a position greater than the array’s length, Serpent won’t stop it.
    • Second,?the Serpent language is untyped. It allows any operation to be performed on any data. Every value is a 256-bit sequence which can be used as an address, a contract, an integer, or an array. Moreover, it performs no checks on the data sent by a user on a transaction.
    • ZS proposed a mitigation plan to reduce damages to the Augur project, which was accepted by their team. It included:
      • Writing a new REP smart contract in Solidity, based on?OpenZeppelin’s reusable components.
      • Auditing the new REP token contract.
      • Disclosing to exchanges and wallet providers on July 24, 2017, 25 hours before public disclosure.
      • Deploying the new REP token contract to the Ethereum blockchain.
      • Freezing the old REP token on July 25, 2017.
      • Migrating the balances of the frozen REP token into the new REP token.

    ?

    COINDASH

    • CoinDash, Israeli blockchain technology startup project, was hijacked by the hackers on July 17, 2017.
    • In the middle of its ICO, the attackers withdrew $7 Million worth of Ether tokens. Investors sent 43438.455 Ether to the wrong address under the hackers’ control.
    • The attackers hacked CoinDash’s site and changed their ETH for an ICO address to their own fund store.
    • An estimated 43,500 ETH were redirected to the perpetrators’ wallet address.
    • CoinDash team claimed in a statement on its site that they were responsible to all the contributors and would provide tokens (CDTs) to people who sent ethereum to the fraudulent address.

    ?

    PARITY

    • On?July, 19 2017,?there was a?security alert?on about a vulnerability in Parity Wallet’s variant of the standard multi-signature contract.
    • A vulnerability was discovered on the Parity Multisig Wallet using Parity client version 1.5 or later (that was released on the 19th of January 2017)
    • The hacker managed to steal over 150,000 ETH (~$ 30M) from three multi-sig contracts. Here is the?data.
    • The bug was ranked as a critical one in a specific multi-sig contract known as wallet.sol.White Hat hackers?rescued funds from vulnerable multisigs.
    • Parity urged the users to immediately move their funds to other wallets such as?MyEtherWallet, a Geth node, or any single-user wallets created on Parity.
    • According to Zeppelin Solutions, the attacker sent two transactions to each of the affected contracts: the?first?to obtain exclusive ownership of the MultiSig, and the?second?to move all of its funds.
    • Let’s consider the detailed description of the vulnerability analyzed by Open Zeppelin’s team below. The source:?The Parity Wallet Hack Explained:
    • We can see that the first transaction is a call to initWallet (line 216 of WalletLibrary):

    • This function was probably created as a way to extract the wallet’s constructor logic into a separate library. This uses a similar idea to?the proxy libraries pattern. The wallet contract forwards all unmatched function calls to the library using?delegatecall, in?line 424 of Wallet:

    • This?causes all public functions from the library to be callable by anyone, including?initWallet, which can change the contract’s owners. Unfortunately,?initWallet?has no checks to prevent an attacker from calling it after the contract was initialized. The attacker?exploited this?and simply changed the contract’s?m_owners?state variable to a list containing only their address, and requiring just one confirmation to execute any transaction:

    • After that, it was just a matter of?invoking the execute function?to send all funds to an account controlled by the attacker:

    • This execution was automatically authorized, since the attacker was then the only owner of the multisig, effectively draining the contract of all its funds.

    The solution.?The attack could have been prevented either by not extracting the constructor logic into the library contract altogether or better by?not using?delegatecall as a catch-all forwarding mechanism.?The recommended pattern is explicitly defining which library functions can be invoked externally on the wallet contract.

    It is important to note that the technique of abstracting logic into a shared library can be quite useful, though. It helps improve code reusability and reduces gas deployment costs. This attack, however, makes clear that a set of best practices and standards is needed in the Ethereum ecosystem to ensure that these coding patterns are implemented effectively and securely. Otherwise, the most innocent-looking bug can have disastrous consequences.

    ?

    SATOSHI PIE

    • On July?19, 2017, due to the vulnerability in the Ethereum wallet Parity, about 32.4% of the fund’s assets or about $ 7M were withdrawn by the hackers from Satoshi Pie.
    • Most of the funds were withdrawn within an hour. The project team managed to rescue the remaining funds sending them to a new wallet.
    • The hack led to not identified accounts. However, it was carried out by the White Hats Group who created new wallets with multipoles with the same characteristics that have affected the vulnerability of wallets.
    • The error was found in a separate contract with multipoles known as wallet.sol.
    • Here is the history of the vulnerability solutions and recovery strategy (the source of information:?https://steemit.com/ethereum/@hipster/updates-satoshi-pie-ethereum-multisig-has-been-hacked?):
    • Estimation of vulnerable code based on contract version where White hats are sending values.

    8 lines updated

    • Parity Blog?published a new version of contract in Parity?Github PR.
    • Future multi-sig wallets created by versions of Parity are secure. Fix in the code is?https://github.com/paritytech/parity/pull/6103?and the newly registered code is?https://etherscan.io/tx/0x5f0846ccef8946d47f85715b7eea8fb69d3a9b9ef2d2b8abcf83983fb8d94f5f
    • Recovery strategy was as follows:
  • to provide best in breed blockchain asset management service.
  • to change valuation cycle from 24 hours to 1 week for Satoshi Pie product.
  • to implement a hard limit on deposits and withdrawals at 10 BTC for one transaction. Fewer transactions should go through the market.
  • to move Ethereum holdings (if recovered) to?Zeppelin smart contract framework.
  • to publish bug bounty program.
  • to publish the new version of Satoshi Pie white paper
    • The?new contract?deployed by WHG?has been verified
    • All values have been returned under SatoshiPie control.
    • There is?the new contract.

    ?

    VERITASEUM

    • On July 23, 2017,?Veritaseum?was attacked by the hacker during an ICO who managed to redirect Veritas (VERI) tokens to an unknown digital wallet.
    • Approximately $8.5 million worth of VERI tokens were stolen from the company.
    • Veritaseum was under?scrutiny by community members?who were skeptical of the company’s security protocols that lacked?SSL, or cryptographic protocols used to relay information across a computer network.
    • In order to foul their trails, the hackers dumped the tokens into two separate wallets, then directed to other accounts.
    • The hack is still being investigated, and so far there is limited information out there.

    ?

    ?

    References:

    1. The DAO, The Hack, The Soft Fork and The Hard Fork
    https://www.cryptocompare.com/coins/guides/the-dao-the-hack-the-soft-fork-and-the-hard-fork/?

    2. The History of the DAO and Lessons Learned
    https://blog.slock.it/the-history-of-the-dao-and-lessons-learned-d06740f8cfa5

    3. Classic Ether Wallet Falls Victim to a social Engineering Hacker
    https://www.cryptocoinsnews.com/classic-ether-wallet-falls-victim-to-a-social-engineering-hacker/

    4. Classic Ether Wallet has been hacked – do not use it to send currency
    http://www.ibtimes.co.uk/classic-ether-wallet-has-been-hacked-do-not-use-it-send-currency-1628479

    5. A survey of attacks on Ethereum smart contracts
    https://eprint.iacr.org/2016/1007.pdf

    6. GovernMental
    https://www.reddit.com/r/ethereum/comments/4ghzhv/governmentals_1100_eth_jackpot_payout_is_stuck/

    7. Massive “Hack” Hits Ethereum Parity Clients – More Than $30M Of Ether Still At Large
    https://www.ethnews.com/massive-hack-hits-ethereum-parity-clients–more-than-30m-of-ether-still-at-large

    8. Hackers have stolen $32 million in Ethereum in the second heist this week
    http://uk.businessinsider.com/report-hackers-stole-32-million-in-ethereum-after-a-parity-breach-2017-7

    9. [Updates] Satoshi?Pie Ethereum multisig has been hacked
    https://steemit.com/ethereum/@hipster/updates-satoshi-pie-ethereum-multisig-has-been-hacked

    10. Veritaseum Hacked
    https://www.ethnews.com/reggie-middleton-on-the-veritaseum-hack

    11. Fourth largest Bitcoin exchange. Bithumb, hacked for billions of Won
    https://bravenewcoin.com/news/fourth-largest-bitcoin-exchange-bithumb-hacked-for-billions-of-won

    12. One of the Biggest Ethereum and Bitcoin Exchanges Got Hacked
    http://fortune.com/2017/07/05/bitcoin-ethereum-bithumb-hack/

    13. Post-Mortem Investigation
    https://www.kingoftheether.com/postmortem.html

    14. Augur REP Token Critical Vulnerability Disclosure
    https://blog.zeppelin.solutions/augur-rep-token-critical-vulnerability-disclosure-3d8bdffd79d2

    15. HackerGold Bug Analysis
    https://blog.zeppelin.solutions/hackergold-bug-analysis-68d893cad738

    16. Vulnerability in StandardToken.sol’s implementation of transferFrom() #8
    https://github.com/ether-camp/virtual-accelerator/issues/8


    原文:https://applicature.com/blog/history-of-ethereum-security-vulnerabilities-hacks-and-their-fixes

    總結

    以上是生活随笔為你收集整理的HISTORY OF ETHEREUM SECURITY VULNERABILITIES, HACKS AND THEIR FIXES的全部內容,希望文章能夠幫你解決所遇到的問題。

    如果覺得生活随笔網站內容還不錯,歡迎將生活随笔推薦給好友。

    国产精品视频免费在线观看 | 国产精在线 | 高清国产午夜精品久久久久久 | 成人免费在线播放 | 日韩国产精品一区 | 亚洲视频电影在线 | 91精品免费在线视频 | 免费在线观看成人av | 亚洲aⅴ乱码精品成人区 | 成av在线| 99久久精品视频免费 | 菠萝菠萝蜜在线播放 | 亚洲永久精品一区 | 成人av电影免费在线观看 | 欧美日韩精品网站 | av国产在线观看 | 欧美精品乱码久久久久久 | 日本黄色黄网站 | 日本大尺码专区mv | 亚洲黄色小说网址 | 欧美片一区二区三区 | av中文资源在线 | 狠狠操夜夜 | 西西人体www444 | 婷婷去俺也去六月色 | 精品二区视频 | 日韩视频在线观看视频 | 日日日日干 | 国产午夜精品一区二区三区四区 | 免费视频成人 | 黄在线| 亚洲一级片免费观看 | 狠狠狠干 | 日韩av成人在线观看 | 日韩大片在线免费观看 | 在线观看欧美成人 | 在线观看黄色国产 | 91久久精品日日躁夜夜躁国产 | 天天操导航 | 久久久精品欧美一区二区免费 | 国产韩国日本高清视频 | 亚洲精品66 | 久久久精品综合 | 人人精久 | 国产精品一区免费观看 | 99国产精品久久久久老师 | 一级c片 | 免费日韩| 久久超碰在线 | 日韩有码专区 | 麻豆va一区二区三区久久浪 | 午夜精品久久久久久久99 | 国产一区二区在线播放 | 麻豆精品视频在线 | av解说在线观看 | 亚洲精品国产精品国自产在线 | 国产成人精品999在线观看 | 国产精品一区二区三区四区在线观看 | 激情五月在线 | 亚洲国产三级 | 久久99精品久久久久久 | 久久国产精品免费一区二区三区 | 香蕉精品在线观看 | 丁香花在线观看免费完整版视频 | 伊人干综合 | 免费观看v片在线观看 | 五月婷婷,六月丁香 | 精品在线观看一区二区三区 | av免费在线播放 | 亚洲午夜精品在线观看 | 美女视频黄色免费 | 一区二区在线影院 | 中文字幕免费观看全部电影 | 深夜免费福利视频 | 91高清在线看| 99国产一区 | 国产成人av网 | 久久不卡日韩美女 | 日日干干夜夜 | 亚洲 精品在线视频 | 欧美精品久久久久 | 高清国产一区 | 国产免费作爱视频 | 五月婷婷久久丁香 | 日韩精品亚洲专区在线观看 | 久草a视频 | 亚洲精品456在线播放乱码 | 夜夜爱av | 91在线在线观看 | 综合久久五月天 | 97视频久久久 | 亚洲激情| 国产剧情在线一区 | 97在线看片 | 中文字幕91在线 | 欧美日韩一级在线 | 日韩av高清在线观看 | av福利在线免费观看 | 亚洲精品中文在线资源 | 国外av在线| www.在线看片.com | 成人综合日日夜夜 | 亚洲欧美成人在线 | 天天操狠狠操网站 | 综合黄色网 | 91免费高清视频 | 午夜精品一区二区三区四区 | 欧美成人精品在线 | 国产女v资源在线观看 | 成年人视频在线免费观看 | 美女黄频在线观看 | 又黄又爽又无遮挡免费的网站 | www99久久| 波多野结衣一区二区三区中文字幕 | 九九99 | 亚洲最大成人网4388xx | 国产高清av | 精品一区二区在线播放 | 久久精品站 | 亚洲综合色网站 | 国内精品免费 | 激情av网址 | 狠狠狠狠狠色综合 | 日韩高清在线观看 | 色天堂在线视频 | 日韩视频中文字幕在线观看 | 欧美亚洲专区 | 97精品国自产拍在线观看 | 亚洲国产字幕 | 午夜成人免费电影 | 天天艹天天干天天 | 尤物一区二区三区 | 亚洲在线精品 | 亚洲综合成人婷婷小说 | 日本mv大片欧洲mv大片 | www.色午夜 | 九九在线高清精品视频 | 91中文字幕网 | japanesexxx乱女另类 | 欧美肥妇free| 三级av片| 亚洲日本中文字幕在线观看 | 久久tv| 亚洲精品乱码久久久一二三 | 久久试看| 欧美成人精品三级在线观看播放 | 天天做天天爱天天综合网 | 亚洲精品高清一区二区三区四区 | 免费观看mv大片高清 | 天天草天天 | 深夜激情影院 | 99热九九这里只有精品10 | 国产亚洲精品v | 国产高清视频 | av官网| 国产精品成人在线观看 | 亚洲欧美激情插 | 亚洲精品视频在线观看免费视频 | 97影视 | 色综合久久88色综合天天免费 | 黄色一区二区在线观看 | 中文 一区二区 | 国产精品中文字幕在线播放 | 最新婷婷色 | 国产中文在线观看 | 视频国产区 | 久久黄色网页 | 亚洲精品乱码久久久久久蜜桃欧美 | 天天色天天操综合 | 中文字幕文字幕一区二区 | av在线免费观看黄 | 亚洲韩国一区二区三区 | 我要色综合天天 | 久草精品视频在线播放 | 中文字幕人成人 | 精品福利网 | 国产精品久久久久久久久岛 | 国产精品成人aaaaa网站 | 欧美激情精品久久久 | 亚洲精品综合一二三区在线观看 | 日韩免费电影在线观看 | 国产一区二区三区高清播放 | 久久伊人八月婷婷综合激情 | 黄av免费| 免费成人结看片 | 亚洲综合国产精品 | 在线一二三四区 | 日韩国产精品毛片 | 国产理论免费 | 欧美精品v国产精品v日韩精品 | 国产亚洲精品成人av久久ww | 中文视频一区二区 | 三级视频日韩 | 久久精品九色 | 亚洲一区二区三区91 | 91亚洲精品乱码久久久久久蜜桃 | 伊人六月 | 久草在在线 | 久久精品欧美 | 狠狠色丁香婷婷综合欧美 | 亚洲一区二区三区四区在线视频 | 久久国产精品视频 | 在线看片91| 又湿又紧又大又爽a视频国产 | 狠狠色丁香久久婷婷综合五月 | 免费在线视频一区二区 | 91成人免费观看视频 | 五月天六月色 | 香蕉视频18 | 中文字幕在线久一本久 | 日本在线观看黄色 | 免费欧美精品 | 在线免费中文字幕 | 91在线视频一区 | 欧美精品一区二区在线播放 | 91精品欧美 | 国产亚洲亚洲 | 欧美日韩视频在线一区 | 久久国产精品99国产精 | 久久久电影 | 在线有码中文字幕 | 国产视频一区二区在线观看 | a视频在线 | 精品一区二区在线播放 | 久九视频 | 天干啦夜天干天干在线线 | 日韩在线免费高清视频 | av中文字幕在线观看网站 | www.黄色在线 | 久久国产精品99久久久久久老狼 | 深爱五月激情五月 | 91成人免费视频 | 国产91在线 | 美洲 | 国产高清在线观看av | 在线观看视频在线观看 | 久久久久久伊人 | 麻豆视频国产精品 | 日韩电影一区二区三区在线观看 | 国产一级在线播放 | 国产不卡av在线 | 免费高清在线观看成人 | 久久免费视频在线观看6 | 亚洲成人影音 | 一级a性色生活片久久毛片波多野 | 色噜噜狠狠狠狠色综合 | 欧美日韩国产成人 | 精品国精品自拍自在线 | 国产精品久久一 | 成年人免费在线观看网站 | 天堂av官网 | 日本精品久久久久 | 啪啪动态视频 | 久久国语露脸国产精品电影 | 色婷在线 | 欧美日一级片 | 午夜精品久久久久久久99 | 97色综合| aaa黄色毛片 | 国产一级一片免费播放放 | 国产96视频| .国产精品成人自产拍在线观看6 | 国产精品美女久久久久久久 | 久久免费国产精品1 | 久久情网 | 欧美精品在线观看免费 | 91成人免费看 | 中文字幕高清av | 成人小电影在线看 | 香蕉视频在线视频 | 中文字幕在线观看完整版电影 | 热99在线| 国产理论片在线观看 | 亚洲精品一区二区精华 | 国产欧美综合在线观看 | 国产精品扒开做爽爽的视频 | 国产成人精品久久二区二区 | 99看视频在线观看 | 国产一区久久久 | www.天天综合 | 日韩中文在线电影 | 成人免费看电影 | 色婷婷福利视频 | 亚洲视频大全 | 国产中文字幕在线观看 | 国产一级在线播放 | 成人免费在线看片 | 午夜电影久久久 | 伊人久久在线观看 | 久久九九影视网 | 国产一区二区精品久久 | 国产最新在线 | 日本在线观看中文字幕无线观看 | 国产精品久久久久久久久久久免费看 | 在线 视频 亚洲 | 天天在线操 | 久久99热精品 | 久久精品欧美日韩精品 | 久久久久久99精品 | a成人v | 91久久爱热色涩涩 | 婷婷丁香色综合狠狠色 | 日韩av影视在线观看 | 久久久久成人精品免费播放动漫 | 亚洲综合色站 | 国产美女被啪进深处喷白浆视频 | 在线视频精品播放 | 亚洲欧洲一区二区在线观看 | 激情黄色一级片 | 444av| 美女视频网站久久 | 成人国产精品免费观看 | 中文字幕在线播出 | 92中文资源在线 | 伊人五月婷 | 国产日本在线播放 | 最近中文字幕在线 | 免费久草视频 | 色婷婷在线观看视频 | 亚洲天天摸日日摸天天欢 | 久久久久国产精品免费网站 | 日本精品视频在线 | 久久亚洲视频 | 91精品一区国产高清在线gif | av亚洲产国偷v产偷v自拍小说 | 五月婷婷在线播放 | 日本字幕网| 91视频网址入口 | 国产无套精品久久久久久 | 91精品国产综合久久久久久久 | 日韩av一区二区三区四区 | 91久久国产自产拍夜夜嗨 | 成人日批视频 | 免费观看一级视频 | 中文在线a∨在线 | 91tv国产成人福利 | 日韩成人看片 | 97热久久免费频精品99 | 亚洲国产精品成人精品 | 九九久久婷婷 | 97精品国产 | 涩涩伊人 | 国产在线免费观看 | 人人爽人人乐 | 国产精品一区二区三区电影 | 91香蕉亚洲精品 | 一区二区三区四区五区在线视频 | 欧美日韩免费一区二区 | 91网免费观看 | 国产精品高清一区二区三区 | 久久精品艹| 在线免费观看黄色 | 99人久久精品视频最新地址 | av在线免费观看网站 | 国产精品九九九九九九 | 豆豆色资源网xfplay | 久热只有精品 | 国内精品久久久久久中文字幕 | 久久精品系列 | 国产二区精品 | 久久久国产成人 | 99爱这里只有精品 | 18国产精品白浆在线观看免费 | 成人黄色免费在线观看 | 天天爽天天爽 | 就要干b| www.夜夜骑.com | 久久久久久高清 | 中文字幕在线观看网址 | 欧美黑人巨大xxxxx | 美女视频黄是免费的 | 亚洲九九爱 | 精品国产理论 | 天堂网一区二区三区 | 国产原创在线观看 | 九九久久国产精品 | 色狠狠综合天天综合综合 | 欧美日韩精品二区第二页 | 久久免费在线视频 | 一区二区三区在线视频111 | 免费在线观看av网址 | 日韩视频一区二区在线观看 | 天天爽天天摸 | 久久成人国产精品入口 | 免费在线观看成人小视频 | 亚洲视频aaa | 91桃色视频 | 欧美日韩精品久久久 | 果冻av在线| 在线中文字幕av观看 | 在线看片日韩 | av夜夜操 | 国产高清在线免费观看 | 久草色在线观看 | 国产在线超碰 | 永久免费毛片在线观看 | japanese黑人亚洲人4k | 在线观看mv的中文字幕网站 | 久久久精品成人 | 国产精品手机视频 | 国产中文字幕网 | 日韩视频精品在线 | 免费一级特黄毛大片 | 久久久久高清毛片一级 | 亚洲精品视频在线 | 欧美在线视频不卡 | 精品三级av | 亚洲va欧美va人人爽春色影视 | 麻花豆传媒一二三产区 | 91av中文字幕| 久久久国产毛片 | 日本性生活一级片 | 亚洲黄色免费 | 丁香六月色 | 欧美精品乱码久久久久 | 日韩中文字幕视频在线观看 | 久久艹在线观看 | 欧美日韩三区二区 | 欧美激情另类文学 | 六月丁香婷婷久久 | 97超碰资源站 | 婷婷激情综合五月天 | 久久中文精品视频 | 超碰公开在线观看 | 在线成人国产 | 亚洲午夜精品久久久 | 96久久精品 | 久草在线资源观看 | 五月婷婷亚洲 | 亚洲天堂自拍视频 | 久草在线99 | 国产一区在线免费 | 韩国av免费 | 久久tv| 久久综合久久综合久久 | 国产精品视频你懂的 | 天天操天天曰 | 日本爽妇网 | 超碰97成人 | av免费在线免费观看 | 国产理论免费 | 欧美极品少妇xxxx | 亚洲午夜精品久久久久久久久久久久 | 日本精品中文字幕在线观看 | 特级黄色视频毛片 | 麻豆视频免费 | 久久久久亚洲精品国产 | 91九色视频在线播放 | 99精品视频在线观看播放 | 少妇av网 | 成人免费精品 | 麻豆国产在线播放 | 黄色在线成人 | 国产美腿白丝袜足在线av | 国产成人91| 成人在线一区二区三区 | 美国三级黄色大片 | 日本黄色黄网站 | 国产一级视屏 | 91亚洲综合 | 久久国产精品99精国产 | 成人网444ppp | www视频免费在线观看 | 久久久久久久久久网 | 欧洲在线免费视频 | 日韩特级毛片 | 成人黄色在线播放 | 五月婷婷综合久久 | 五月天激情视频在线观看 | 国产丝袜美腿在线 | 亚洲经典在线 | 人人精品 | 日韩av影视在线 | 黄色一级片视频 | 伊人黄| 视频在线观看99 | 国产区免费 | 国产亚洲午夜高清国产拍精品 | 亚洲欧美日韩国产精品一区午夜 | 丝袜网站在线观看 | 成年美女黄网站色大片免费看 | 欧美日韩久久不卡 | 国产色影院 | 国产一级淫片免费看 | www黄免费| 亚洲婷婷网 | 国产精品一区二区免费视频 | .国产精品成人自产拍在线观看6 | 国产男女无遮挡猛进猛出在线观看 | 国内精品久久久久久久影视麻豆 | 97视频人人澡人人爽 | av一级久久 | 国内精品久久久久影院一蜜桃 | 国产一级免费片 | 91视频亚洲| 日本精品二区 | 久久精品99国产国产 | 国产精品3 | 黄色激情网址 | 99精品视频中文字幕 | 久久久久久中文字幕 | .国产精品成人自产拍在线观看6 | 久草在线在线精品观看 | 精品国产_亚洲人成在线 | 国产精品久久久亚洲 | 99精品热视频只有精品10 | 亚洲最新在线视频 | 成人黄色大片 | 在线小视频你懂得 | 婷婷成人亚洲综合国产xv88 | 日本精品久久久久中文字幕 | 狠狠色丁香婷婷综合橹88 | 日韩理论在线播放 | 日本精品一区二区三区在线观看 | 五月婷婷激情综合 | 亚洲精品免费在线观看视频 | 久久久精品久久日韩一区综合 | 国产一级电影免费观看 | 亚州国产精品视频 | 亚洲一区久久久 | 精品福利视频在线 | 99精品视频在线观看播放 | 精品免费在线视频 | 在线免费观看欧美日韩 | 夜夜躁狠狠躁日日躁 | 成人免费观看视频网站 | 亚洲视频第一页 | 日本中文字幕电影在线免费观看 | 久久尤物电影视频在线观看 | 4438全国亚洲精品在线观看视频 | 久久国产精品99久久人人澡 | 久久理论电影网 | 丁香婷五月 | 国产美女视频一区 | 婷婷综合在线 | 欧美精品二区 | 色av男人的天堂免费在线 | 操高跟美女 | 激情久久五月天 | 81国产精品久久久久久久久久 | 久久久久久久久久久久久久免费看 | 久久久久久99精品 | 狠狠躁18三区二区一区ai明星 | 亚洲视频久久久 | 久久免费福利视频 | 国产一级淫片免费看 | 国产伦精品一区二区三区免费 | 在线观看久久久久久 | 亚洲精品国产综合久久 | 亚洲无线视频 | 亚洲精品在线播放视频 | 国产成人精品女人久久久 | 亚洲成av人片在线观看香蕉 | 超碰在线99 | 国产精品2019| 91在线网址| 精品国产一区二区三区免费 | 久久综合久久综合久久综合 | 国产精品一区二区三区免费看 | 成人黄色小说在线观看 | 欧美精品xxx | 国产一级片免费播放 | 日韩在线网 | 伊人手机在线 | 97精品国产一二三产区 | 福利视频一区二区 | 韩国一区二区三区视频 | 人人干网| 午夜在线资源 | 欧美精品一区二区在线播放 | 国产又粗又猛又黄又爽视频 | 天天干人人插 | 日本韩国在线不卡 | 国产成人久久精品77777 | 又黄又爽的视频在线观看网站 | 久久久九色精品国产一区二区三区 | 亚洲成人麻豆 | 日韩网站免费观看 | 精品在线播放视频 | 丝袜制服天堂 | 九九视频免费在线观看 | 少妇精69xxtheporn | 在线亚洲欧美视频 | 中文在线免费看视频 | 97碰碰视频 | 欧美国产大片 | 精品在线观看视频 | 天天综合日日夜夜 | 欧美黄色成人 | av成人免费在线观看 | 中文字幕精品一区二区三区电影 | 亚洲欧美日韩一级 | 91麻豆国产 | 黄色成品视频 | 日韩专区在线 | 欧美一区二视频在线免费观看 | 福利视频一二区 | 日批网站在线观看 | 欧美日韩亚洲国产一区 | 天天se天天cao天天干 | 在线精品视频免费播放 | 91av免费看 | 欧美va天堂在线电影 | 婷婷视频在线播放 | 免费成人在线观看 | 国产青青青| 国产一级做a爱片久久毛片a | 日韩精品专区在线影院重磅 | 黄污视频网站大全 | 麻豆影音先锋 | 五月婷婷综合久久 | 免费看wwwwwwwwwww的视频 久久久久久99精品 91中文字幕视频 | 在线观看亚洲国产精品 | 在线观看黄色免费视频 | 日韩中文字 | 免费观看一级特黄欧美大片 | 91麻豆国产福利在线观看 | 日韩精品在线观看av | 超碰国产在线观看 | 日本久久久亚洲精品 | 久久精品伊人 | 麻花天美星空视频 | 特级西西444www大胆高清无视频 | 国产视频在线免费 | 婷婷 中文字幕 | 久草视频中文 | 四虎免费在线观看视频 | 99视频免费看 | 精品国模一区二区 | 久久综合久色欧美综合狠狠 | 狠狠伊人| 99国产成+人+综合+亚洲 欧美 | 成人黄色电影在线 | 中文字幕在线观看视频一区二区三区 | 欧美日韩精品影院 | 操久久网| 丝袜制服综合网 | 精品久久影院 | 色久天| 国产1区2区 | 五月天.com| 曰本免费av | 中文字幕在线看视频 | 在线国产中文字幕 | 91资源在线免费观看 | 最新av免费在线 | 国产精品2018| 中文av资源站 | 麻花天美星空视频 | 国产精品永久 | 亚洲国产中文字幕在线观看 | 欧美 激情 国产 91 在线 | 97在线观视频免费观看 | 嫩嫩影院理论片 | 免费看日韩 | 91插插影库 | 日韩两性视频 | 婷婷六月天在线 | 丁香久久久 | 日日干天天爽 | 在线视频你懂得 | 在线观看你懂的网站 | 在线国产精品视频 | 成人国产电影在线观看 | 在线免费观看黄色小说 | 久久影院亚洲 | 国产美女在线观看 | 国产精品免费观看视频 | 亚洲欧洲中文日韩久久av乱码 | 激情网在线观看 | 在线看不卡av | 国产麻豆精品在线观看 | 久久激五月天综合精品 | 国产小视频在线免费观看 | 蜜臀av性久久久久av蜜臀三区 | av电影在线播放 | 国产一区免费看 | 91漂亮少妇露脸在线播放 | 成人黄色av网站 | 热久久视久久精品18亚洲精品 | 日韩成人免费电影 | 99视频在线免费 | 免费的黄色的网站 | 天天色.com | 国产精品久久嫩一区二区免费 | 免费精品人在线二线三线 | 亚洲在线视频播放 | 美女亚洲精品 | 色婷婷欧美 | 婷婷在线视频观看 | 国产成人精品一二三区 | 在线看中文字幕 | 成人福利在线播放 | 国产精品久久久久久久久大全 | 91久久黄色 | 91av九色| 91粉色视频| 视频一区二区在线观看 | 97在线影视 | 人人澡人人模 | 天天操综 | 日本三级香港三级人妇99 | 色丁香婷婷 | 中文乱码视频在线观看 | 91秒拍国产福利一区 | 久久精品一二区 | 色5月婷婷| 欧美精品第一 | 91亚洲精品久久久久图片蜜桃 | 国产亚洲成av片在线观看 | 成人黄色短片 | 精品久久久久久电影 | 91麻豆精品国产91久久久更新时间 | 亚洲综合视频网 | 98超碰在线观看 | 久久99精品久久久久久 | 国产免费观看视频 | av在线播放中文字幕 | 欧美日韩国产在线一区 | 精品二区视频 | 欧美极度另类性三渗透 | 在线观看免费av片 | 免费色视频 | 国产精品99久久久久久小说 | 国产成人福利在线 | 国产一区免费观看 | 国产呻吟在线 | 国产国产人免费人成免费视频 | 丁香六月婷 | 成人试看120秒 | 久久国产精品区 | 国产精品国产三级国产专区53 | 亚洲一二区视频 | 欧美国产日韩在线观看 | 国产精品久久久久久久久久久久午夜 | 精品一区二区电影 | 久久精品国产一区二区电影 | 综合色久 | 黄色亚洲片 | www.国产毛片 | 国产精品久久久久久久久久尿 | 色资源在线| 黄色日本免费 | 欧美黄污视频 | 97偷拍视频 | 久久国产精品色婷婷 | 精品96久久久久久中文字幕无 | 成年人网站免费观看 | 久久夜av| 国产在线观看xxx | 99热在线看 | 成人av电影免费在线观看 | 成年人三级网站 | 国产精品久久久久免费观看 | 国产美女精彩久久 | 亚洲网久久 | 手机在线观看国产精品 | 高清av免费观看 | 日韩欧美在线免费观看 | 在线观看亚洲精品 | 在线观看国产www | 99精品视频免费全部在线 | 久久成人一区 | 国产在线视频资源 | 97在线观看视频免费 | 不卡的av在线 | 色大片免费看 | 69亚洲乱| 中文字幕第 | 中文字幕丝袜一区二区 | 看片一区二区三区 | 婷婷丁香导航 | 欧美日韩亚洲第一页 | 精品a视频| 国产成人一区二区啪在线观看 | 国产视频资源 | 成人小视频在线播放 | 日韩手机在线 | 日韩女同一区二区三区在线观看 | 日韩精品不卡在线 | 成年人黄色免费看 | 欧美日韩国产综合一区二区 | 欧美少妇影院 | 久久麻豆视频 | 国产精品免费观看国产网曝瓜 | 国产精品成人免费精品自在线观看 | 在线播放91 | 91在线精品视频 | 欧美疯狂性受xxxxx另类 | 天天草综合网 | 中文字幕 国产专区 | 日韩久久久久 | 插综合网 | 亚洲视频免费视频 | 久久夜色精品国产欧美乱极品 | 日韩欧美高清在线 | 91精品视频免费看 | 国产精品网红直播 | 91喷水 | 欧美精品久久久久久久久久丰满 | 国产精品中文字幕在线播放 | 九九九热 | 99九九免费视频 | va视频在线 | 欧美日韩视频在线一区 | 91色在线观看| 欧美色图视频一区 | 中文字幕亚洲高清 | av中文在线 | 黄色最新网址 | 超碰国产人人 | 99久久婷婷国产综合亚洲 | 综合网伊人| 久草在线99 | www.av免费观看 | 日韩一级黄色片 | 日韩av偷拍 | 国产精品久久久影视 | 怡红院久久| 香蕉精品在线观看 | 中文字幕av最新 | 亚洲国产精品成人综合 | 黄色三级av | 六月丁香在线视频 | 成 人 黄 色 片 在线播放 | 午夜精品久久久久久 | 国产一级免费电影 | 欧美婷婷综合 | 久久久国产精品成人免费 | 亚洲精品免费观看视频 | 免费成人av网站 | 99久久精品免费看国产一区二区三区 | 国产精品免费大片视频 | 特级西西444www大胆高清无视频 | 成人毛片一区二区三区 | 女人魂免费观看 | 午夜体验区 | 九九九热| 国产a高清 | 国产黄色特级片 | 911香蕉视频| 黄色小说免费在线观看 | 日本99干网 | 色精品视频 | 国产精品一区二区你懂的 | 不卡国产视频 | 久久综合亚洲鲁鲁五月久久 | 一级淫片在线观看 | 美女在线观看av | 日韩丝袜在线观看 | 五月开心网 | 日日操狠狠干 | 亚洲综合色婷婷 | 24小时日本在线www免费的 | 国际精品久久久久 | 亚洲欧美日韩不卡 | 在线不卡视频 | 国产精品一区在线观看你懂的 | 久爱精品在线 | 国产精品网站 | 中文字幕三区 | 国产情侣一区 | 91视频在线看 | 99在线免费观看视频 | 奇米网在线观看 | 久久国语 | 亚洲精品综合久久 | 在线视频久 | 亚洲成a人片在线www | 国产黄a三级 | 婷婷播播网 | 国产成人精品一区二区三区在线 | 欧美日韩国产在线精品 | 国产精品女同一区二区三区久久夜 | 日韩中文字幕免费在线观看 | 日日干激情五月 | 国产精品一级视频 | 中文字幕一二三区 | 在线观看成人福利 | 中文字幕在线观看日本 | 久久er99热精品一区二区三区 | 久草在线视频首页 | 91自拍视频在线观看 | 欧美激情视频在线观看免费 | 999在线视频| 2018亚洲男人天堂 | 91精品资源 | 欧美成人在线免费 | 免费毛片一区二区三区久久久 | 国内精品中文字幕 | 午夜视频二区 | 国产精品入口麻豆 | 毛片精品免费在线观看 | 精品视频在线观看 | 中文字幕第一页av | 在线观看色视频 | 91精品办公室少妇高潮对白 | 五月开心色 | 亚洲国产精品久久 | 成人在线视| 精品视频免费看 | 91精品久久久久久久99蜜桃 | 成年人在线观看视频免费 | 欧美日韩三级在线观看 | 中文字幕在线久一本久 | 99高清视频有精品视频 | 天天艹天天干天天 | 久久久国产精华液 | 国产亚洲精品福利 | 国产手机视频在线 | 婷婷综合久久 | 午夜视频在线观看网站 | 81精品国产乱码久久久久久 | 啪嗒啪嗒免费观看完整版 | 亚洲精品在线观看中文字幕 | 最近日韩中文字幕中文 | 91成人在线视频 | 国产中文自拍 | 综合久久久久 | 久久久精品免费看 | 五月在线视频 | 黄色三级在线看 | 97免费在线观看视频 | 美女网站在线免费观看 | 久久不卡日韩美女 | 日本精品久久久久影院 | 97热久久免费频精品99 | 日韩在线视频一区二区三区 | 中中文字幕av在线 | 日韩在线观看网站 | 综合久久精品 | av成人亚洲| 5月丁香婷婷综合 | 国产免费观看久久黄 | 国产一级淫片在线观看 | 成人精品亚洲 | 国产精品毛片一区二区在线看 | 黄色成人小视频 | 国产精品免费一区二区三区在线观看 | 99精品一级欧美片免费播放 | 成人av在线看 | 久久在线视频在线 | 少妇性bbb搡bbb爽爽爽欧美 | 99av国产精品欲麻豆 | 一区二区三区高清在线观看 | 日韩欧美精品一区二区三区经典 | 天堂av在线免费 | 精品亚洲免费 | 免费看一级黄色 | 九九综合九九综合 | 五月天堂色| 麻豆一区二区 | 国产精品久久久久久久久久免费 | 天天综合天天综合 | 日韩精品五月天 | 麻豆你懂的 | 日日夜夜精品免费 | 成人免费视频播放 | 久章草在线| www.成人久久| 国产福利av | 波多野结衣视频一区二区三区 | 区一区二区三区中文字幕 | 亚洲黄色成人网 | 综合色天天 | 91网页版免费观看 | www.香蕉视频 | 一级成人网| 五月天激情综合网 | 日本性生活免费看 | 一级成人免费视频 | 欧美午夜视频在线 | 97人人精品 | 欧美色图狠狠干 | 久久久精选 | 国产精品久久久久国产a级 激情综合中文娱乐网 | 成人亚洲精品久久久久 | 啪啪动态视频 | 一级黄色网址 | 久操视频在线播放 | 久久综合婷婷国产二区高清 | 成人黄色毛片视频 | 亚洲视频久久 | 亚洲小视频在线观看 | 久久免费视频8 | 干 操 插| 日韩黄色大片在线观看 | 四虎伊人 | 日韩和的一区二在线 | 日本大尺码专区mv | 欧美天天干 | 日韩色高清 | 国产精品18久久久久久vr | 一本一道久久a久久综合蜜桃 | 久久乐九色婷婷综合色狠狠182 | 探花视频免费观看 | 久久国产精品一区二区三区 | 热久久最新地址 | 四虎成人精品永久免费av九九 |