亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? anonymous ftp faq.htm

?? 黑客培訓教程
?? HTM
?? 第 1 頁 / 共 2 頁
字號:
<HEAD><!---SHOWDOWN.ORG---><TITLE>Anonymous FTP FAQ</TITLE><script type="text/javascript"><!--// <![CDATA[ - Ad Muncher helper script: do not remove without removing all references to this in the below page (eg: everything containing "ywzw", "ywzf" or "ywb")var ywzwa,ywzwb,ywzwc,ywzwd,ywzwff,ywzwh,ywzwi,ywzwir,ywzwk,ywzwm,ywzwn,rp,ywzwq,ywzws,ywzwv,ywzww,ywzwy,ywzwro,ywzwolp,ywzwqn,ywzwqnbu,ywzwtop,ywzwpld,ywzwplt,ywzwtopt,ywzwagt;ywzwpld=1;ywzwh=1;ywzwk=1;ywzwd=1;ywzww=0;ywzwy=0;ywzwro=0;ywzwi="";ywzwz="http://www.admuncher.com/";function ywzwps(){eval("ywzwtop="+ywzwtopt+";");};function ywb(z){if(z.location)return false;else return z.blur();};function ywzwj(){ywzwps();if(ywzwtop.ywzwolp)ywzwf();return true;};function ywzf(z){if(z.location)return false;else return z.focus();};function ywzwf(){ywzwps();ywzwtop.ywzwqn=ywzwtop.ywzwqnbu;ywzwtop.ywzwolp=0;};function ywzwr(e){ywzwps();if((e&&e.which==1)||(window.event.button==1)){ywzwtop.ywzwqn=1;setTimeout("ywzwtop.ywzwqn=0;",500);};};function ywzwe(z){ywzwps();ywzwtop.ywzwa=0;ywzwtop.ywzwqnbu=ywzwtop.ywzwqn;ywzwtop.ywzwqn=0;ywzwtop.ywzwolp=1;setTimeout("ywzwtop.ywzwa=1;",5000);ywzwx();if(ywzwh){ywzwh=0;if(ywzwff)ywzwff();};if(z!=7)ywzwf();};function ywzwx(){ywzwq=""+document.onmousedown;if(!document.onmousedown||!ywzwq||ywzwq.indexOf("ywzwr")!=-1){if(document.layers)document.captureEvents(Event.MOUSEDOWN);document.onmousedown=ywzwr;};ywzwq=""+window.onload;if(!window.onload||!ywzwq||(ywzwq.indexOf("ywzwe")!=-1&&ywzwq.indexOf("ywzwf")==-1))window.onload=ywzwe;};function ywzwu(a){ywzwps();ywzwtop.ywzwi=ywzwtop.ywzwi.substring(0,1024);while(ywzwtop.ywzwi.indexOf('"')!=-1)ywzwtop.ywzwi=ywzwtop.ywzwi.replace('"',"<~am~`");while(ywzwtop.ywzwi.indexOf("<~am~`")!=-1)ywzwtop.ywzwi=ywzwtop.ywzwi.replace("<~am~`",'\\"');ywzwtop.ywzwir='ywzwtop.defaultStatus="'+ywzwtop.ywzwi+'";';if(!ywzwtop.ywzws){ywzwtop.ywzws=1;setInterval("eval(ywzwtop.ywzwir);",3000);};setTimeout("eval(ywzwtop.ywzwir);",1000);};function ywzwt(a){ywzwps();if(ywzwtop.ywzwqn||ywzwtop.ywzwa){ywzwtop.ywzwqn=0;return alert(a);};if(a&&ywzwd){ywzwv=a;while(ywzwv.indexOf("\n")!=-1)ywzwv=ywzwv.replace("\n"," ");ywzwtop.ywzwi="Alert message blocked by Ad Muncher: "+ywzwv;ywzwu();};return false;};function ywzwo(a,b,c,d){ywzwps();ywzwtop.ywzwqn=0;if(!a)a="";if(c){c=c.toLowerCase();while(c.indexOf(" ")!=-1)c=c.replace(" ","");if(ywzww){c=c.replace("height=","xxx=");c=c.replace("width=","xxx=");c=c.replace("top=","xxx=");c=c.replace("left=","xxx=");c=c.replace("screenx=","xxx=");c=c.replace("screeny=","xxx=");};if(ywzwy){c=c.replace("location=","xxx=");c=c.replace("toolbar=","xxx=");c=c.replace("menubar=","xxx=");c=c.replace("resizable=","xxx=");c=c.replace("scrollbars=","xxx=");c=c.replace("status=","xxx=");c=c.replace("titlebar=","xxx=");c=c.replace("fullscreen=","xxx=");c=c.replace("directories=","xxx=");};};if(ywzwy){if(c)c+=",";else c="";c+="location,toolbar,menubar,resizable,scrollbars,status,titlebar,directories";};if(d)return open(a,b,c,d);else if(c)return open(a,b,c);else if(b)return open(a,b);else return open(a);};function ywzw(a,b,c,d){ywzwps();ywzwagt=navigator.userAgent.toLowerCase();if(ywzwro||ywzwtop.ywzwa||ywzwtop.ywzwqn||typeof(parent.frames[b])=="subwindow"||typeof(parent.frames[b])=="object"||b=="_top"||b=="_self"||b=="_parent"||((ywzwagt.indexOf("msie")!=-1&&ywzwagt.indexOf("opera")==-1)&&(b=="_search"||b=="_media"))){return ywzwo(a,b,c,d);};if(a){ywzwp="/admuncherpopcheck&"+Math.random();ywzwm=new Image();ywzwm.src=a+ywzwp;ywzwm=ywzwm.src.replace(ywzwp,"");ywzwn=ywzwm.toLowerCase();}else{ywzwm="(No URL)";ywzwn=document.URL.toLowerCase();};if(ywzwa==-1||(ywzwn.indexOf(".aol.com/aimexpress")!=-1)||(ywzwn.indexOf(".bcn-hj.com/")!=-1)||(ywzwn.indexOf(".cnn.com/pr/video/")!=-1)||(ywzwn.indexOf(".com/gp/")!=-1&&ywzwn.indexOf(".asp")!=-1&&ywzwn.indexOf("packageid=")!=-1)||(ywzwn.indexOf(".feedroom.com/")!=-1)||(ywzwn.indexOf(".mail.com/templates/common/")!=-1)||(ywzwn.indexOf("//go.icq.com/")!=-1)||(ywzwn.indexOf("/register/register.jsp?")!=-1)||(ywzwn.indexOf("download.com/")!=-1)||(ywzwn.indexOf("ebizautos.com/shared/viewer.cfm")!=-1)||(ywzwn.indexOf("fiv.sp.co.gg")!=-1)||(ywzwn.indexOf("novapal.com/")!=-1&&ywzwn.indexOf(".pdf")!=-1)||(ywzwn.indexOf("pogo.com/arena/game-outerframeset.jsp?")!=-1)||(ywzwn.indexOf("zdnet.com/")!=-1)){return ywzwo(a,b,c,d);};if(ywzwd&&ywzwm){if(ywzwtop.ywzwb){ywzwc="s";ywzwtop.ywzwb+=", "+ywzwm;}else{ywzwc="";ywzwtop.ywzwb=ywzwm;};ywzwtop.ywzwi="Popup"+ywzwc+" on page blocked by Ad Muncher: "+ywzwtop.ywzwb;ywzwu();};return false;};ywzwx();try{if(top.ywzwpld){top.rplt=1;ywzwtopt="top";}else ywzwtopt="self";}catch(e){ywzwtopt="self";};if(ywzwk)window.onerror=ywzwj;// ]]>> --></script></HEAD><BODY><H1>Anonymous FTP FAQ</h1><i>Version: 3.00</i><p><h2>How to Set up a Secure Anonymous FTP Site</h2><p>	The following is a FAQ on setting up a secure FTP Site.  FTP sitesare known for much abuse by transferring illegal files.  They also open manyoppurtunities for intruders to gain access via misconfigured setups.  Andlastly many versions of ftp servers have had security holes.  This FAQ isintended to clean up this abuse by allowing administrators to go through thischeck list of steps to make sure their FTP is correctly configured and thatthey are running the most current ftp daemon.<p>This is organized in the following fashion, I am breaking into several partsas follows:<br><ol><li><a href = "#general">General Description of Setting up an "Anonymous" FTP server.</a><li><a href = "#chroot">Setting up a chrooted Secure Anonymous FTP server.  </a><li><a href = "#os">OS Specific needed information and suggestions.<ul><li><a href = "#att">Older SVR2 and SVR3 system,RTU 6.0 (Masscomp, now Concurrent Real Time UNIX),and AT&#38;T 3B1 and 3B2 machines</a><li> <a href = "#hpux">HPUX</a><li><a href = "#sol">Solaris 2.x</a><li><a href = "#sun">SunOS </a></ul></a><li><a href = "#other">Where to get other FTP daemons</a><li><a href = "#secure">How to Know if your Anonymous FTP Server is Secure</a><li><a href = "#archie">Archie</a></ol><hr size=5><h3><a name = "general">1.  General Description of Setting up an "anonymous" ftp server.</a></h3><ol><li> Create the user ftp in /etc/passwd.  Use a misc group.  The user's homedirectory will be ~ftp where ~ftp is the root you wish anonymous users tosee.  Creating this user turns on anonymous ftp.<p>Use an invalid password and user shell for better security. The entry in thepasswd file should look something like:<blockquote>    ftp:*:400:400:Anonymous FTP:/home/ftp:/bin/true</blockquote><li> Create the home directory ~ftp.  Make the directory owned by root (NOT ftp)with the same group as ftp.  Thus, owner permissions are for root and grouppermissions are for the anonymous users.  Set the permissions for ~ftp to 555(read, nowrite, execute).<p><b>Warning:</b>Some MAN pages recommend making the ~ftp directory owned by ftp.This is a big NO-NO, if you want any type of security on your system.<p><li>Create the directory ~ftp/bin.  This directory is owned by root (groupe.g. wheel) with permissions 111 (noread, nowrite, execute).<p><li>Copy the program ls into ~ftp/bin.  ls is owned by root with permissions111 (noread, nowrite, execute).  Any other commands you put in ~ftp/bin should have the same permissions as well.<p><li>  Make the directory ~ftp/etc.  This directory is owned by root withpermissions 111.<p><li>  Create from scratch the files /etc/passwd and /etc/group in ~ftp/etc.These files should be mode 444.  The passwd file should only contain root,daemon, uucp, and ftp.  The group file must contain ftp's group. Use your/etc/passwd and /etc/group files as a template for creating passwd and groupfiles going to ~ftp/etc.  You may even change the user names in this file,they are used only for 'ls' command.  So for example if all files in your~ftp/pub/linux hierarchy will be maintained by a real user 'balon' withuid=156 you may put <blockquote>linux:*:156:120:Kazik Balon::</blockquote>in the ~ftp/etc/passwd file (regardless of his real username).  Leave onlythese users who will own files under ftp hierarchy (e.g. root, daemon,ftp...) and definitely remove *ALL* passwords by replacing them with '*' sothe entry looks like:<blockquote>root:*:0:0:Ftp maintainer::<br>ftp:*:400:400: Anonymous ftp::</blockquote>For more security, you can just remove ~ftp/etc/passwd and~ftp/etc/group (the effect is that ls -l will not show the directories' groupnames).  Wuarchive ftp daemon (and some others) have some extensions based onthe contents of the group/passwd files, so read the appropriate documentation.<p><li>  Make the directory ~ftp/pub.  This directory is owned by you and has thesame group as ftp with permissions 555.  On most systems (like SunOS) you maywant to make this directory 2555, ie. set-group-id, in order to create newfiles with the same group ownership.<p>Files are left here for public distribution. All folders inside ~ftp/pubshould have the same permissions as 555.<p><b>Warning: </b>Neither the home directory (~ftp) nor any directory below it should beowned by ftp!  No files should be owned by ftp either.  Modern ftp daemonssupport all kinds of useful commands, such as chmod, that allow outsiders toundo your careful permission settings.  They also have configuration optionslike the following (WuFTP) to disable them:<pre># all the following default to "yes" for everybodydelete          no      guest,anonymous         # delete permission?overwrite       no      guest,anonymous         # overwrite permission?rename          no      guest,anonymous         # rename permission?chmod           no      anonymous               # chmod permission?umask           no      anonymous               # umask permission?</pre><p><li> If you wish to have a place for anonymous users to leave files, createthe directory ~ftp/pub/incoming.  This directory is owned  by root withpermissions 733.  Do a 'chmod +t ~ftp/pub/incoming'.  The ftp daemon willnormally not allow an anonymous user to overwrite an existing file, but anormal user of the system would be able to delete anything.  By setting themode to '1733' you prevent this from happening.  In wuftpd you may configurethe daemon to create new files with permissions '600' owned by root or anyother user.  Many  times, incoming directories are abused by exchanging piratedand pornographic material.  Abusers often create hidden directories there forthis purpose.  Making the incoming directory unreadable by anonymous ftp helpsto some extent.  With ordinary ftp severs there is no way to preventdirectories being created in incoming. The WUarchive ftp server can limituploads to certain directories and can restrict characters used in file nameslike this:<pre># specify the upload directory informationupload  /var/spool/ftp  *       noupload  /var/spool/ftp  /incoming       yes     ftp     staff   0600    nodirs# path filters                                                                                  # path-filter...path-filter  anonymous  /etc/msgs/pathmsg  ^[-A-Za-z0-9_\.]*$  ^\.  ^-path-filter  guest      /etc/msgs/pathmsg  ^[-A-Za-z0-9_\.]*$  ^\.  ^-</pre><p>Suggestion: Create an extra file-system for your ftp-area (or at least foryour incoming-area) to prevent a denial-of-service attack by filling yourdisk with garbage (inside your incoming directory).<p>If you have wuftpd you may want to add some ftp extensions likecompression/decompression 'on the fly' or creation of tar files for thedirectory hierarchies.  Get the appropriate sources (gzip, gnutar, compress),compile them and link statically, put in the ~ftp/bin directory and edit theappropriate file containing the definitions of the allowed conversions./usr/bin/tar is already statically-linked.  You may wish to use gnu taranyway.<p>Gary Mills wrote a small program to support the following:<p>To do tar and compress, he wrote a tiny program called `pipe', andstatically-linked it. His /etc/ftpconversions file looks like this:<pre>#strip prefix:strip postfix:addon prefix:addon postfix:external command:#types:options:description:.Z:  :  :/bin/compress -d -c %s:T_REG|T_ASCII:O_UNCOMPRESS:UNCOMPRESS:-z:  :  :/bin/compress -d -c %s:T_REG|T_ASCII:O_UNCOMPRESS:UNCOMPRESS:  :  :.Z:/bin/compress -c %s:T_REG:O_COMPRESS:COMPRESS:  :  :.tar:/bin/tar cf - %s:T_REG|T_DIR:O_TAR:TAR:  :  :.tar.Z:/bin/pipe /bin/tar cf - %s | /bin/compress -c:T_REG|T_DIR:O_COMPRESS|O_TAR:TAR+COMPRESS:  :  :.tar:/bin/gtar -c -f - %s:T_REG|T_DIR:O_TAR:TAR:  :  :.tar.Z:/bin/gtar -c -Z -f - %s:T_REG|T_DIR:O_COMPRESS|O_TAR:TAR+COMPRESS:  :  :.tar.gz:/bin/gtar -c -z -f - %s:T_REG|T_DIR:O_COMPRESS|O_TAR:TAR+GZIP</pre>Here it is: <p>-----------------8<-------------cut---------------<pre>/* pipe.c: exec two commands in a pipe */#define NULL (char *)0#define MAXA 16main(argc, argv) int argc; char *argv[]; {char *av1[MAXA], *av2[MAXA];int i, n, p[2], cpid;                                                       i = 0; n = 0;while ( ++i < argc && n < MAXA ) {if ( *argv[i] == '|' && *(argv[i]+1) == '\0' ) break;av1[n++] = argv[i];}if ( n == 0 ) uexit();av1[n] = NULL;n = 0;while ( ++i < argc && n < MAXA )av2[n++] = argv[i];if ( n == 0 ) uexit();av2[n] = NULL;if ( pipe(p) != 0 ) exit(1);if ( ( cpid = fork() ) == (-1) ) exit(1);else if ( cpid == 0 ) {(void)close(p[0]);(void)close(1);(void)dup(p[1]);(void)close(p[1]);(void)execv(av1[0], av1);_exit(127);}else {(void)close(p[1]);(void)close(0);(void)dup(p[0]);(void)close(p[0]);(void)execv(av2[0], av2);_exit(127);                                                             }/*NOTREACHED*/}uexit() {(void)write(2, "Usage: pipe <command> | <command>\n", 34);exit(1);}</pre>-------- CUT HERE ------------<p><li> Other things to do:<p>as root:<blockquote>touch ~ftp/.rhosts<br>touch ~ftp/.forward<br>     chmod 400 ~ftp/.rhosts<br>chmod 400 ~ftp/.forward</blockquote>ie. make these files zero-length and owned by root.<p>Due to the last /bin/mail bugs in SunOS:<blockquote>touch /usr/spool/mail/ftp; chmod 400 /usr/spool/mail/ftp</blockquote>Consider an email-alias for the ftp-admin(s) to provide an email-address forproblems-reports.<p>If you are mounting some disks from other machines (or even your own) to the~ftp hierarchy, mount it read-only. The correct entry for the /etc/fstab (onthe host with ftpd) is something like:<blockquote>other:/u1/linux /home/ftp/pub/linux nfs ro,noquota,nosuid,intr,bg 1 0</blockquote>This mounts under /home/ftp/pub/linux the disk from host 'other' with no     quota, no 'suid' programs (just in case), interruptible (in case 'other' goes down) and 'bg' - so if 'other' is down when you reboot it will not stopyou trying to mount /home/ftp/pub/linux all over again.                      </ol><hr size=5><h3><a name = "chroot">2. Setting up a chrooted Secure Anonymous ftp server.</a></h2>This part was contributed by Marcus J Ranum &#60;mjr@tis.com&#62;<ol><li>Build a statically linked version of ftpd and put it in ~ftp/bin.Make sure it's owned by root.<p><li>Build a statically linked version of /bin/ls if you'll need one.Put it in ~ftp/bin. If you are on a Sun, and need to buildone, there's a ported version of the BSD net2 ls commandfor SunOs on ftp.tis.com: pub/firewalls/toolkit/patches/ls.tar.ZMake sure it's owned by root.<p><li> Chown ~ftp to root and make it mode 755     THIS IS VERY IMPORTANT<p><li> Set up copies of ~ftp/etc/passwd and ~ftp/etc/group just as you would                  normally, EXCEPT make 'ftp's home directory '/'   -- make surethey are owned by root.<p><li> Write a wrapper to kick ftpd off and install it in /etc/inetd.confThe wrapper should look something like: (assuming ~ftp = /var/ftp)<pre>main(){if(chdir("/var/ftp")) {	perror("chdir /var/ftp");

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产性做久久久久久| 亚洲资源在线观看| 久久综合久久综合久久| 欧美岛国在线观看| 欧美成人一区二区三区在线观看 | 国产成人一级电影| 美女免费视频一区二区| 捆绑紧缚一区二区三区视频| 秋霞成人午夜伦在线观看| 男女性色大片免费观看一区二区| 男人的天堂亚洲一区| 久久精品二区亚洲w码| 国产一区二区三区久久悠悠色av| 国产一区欧美二区| 成人一区二区三区视频| 91免费看视频| 欧美日韩1234| 精品国产三级a在线观看| 久久久777精品电影网影网| 中文字幕高清不卡| 亚洲人123区| 丝袜亚洲另类欧美综合| 韩国一区二区在线观看| 成人午夜精品在线| 一本到不卡精品视频在线观看| 欧美私人免费视频| 日韩免费高清av| 国产偷国产偷精品高清尤物| 一区视频在线播放| 亚洲国产一区视频| 久久99久久99精品免视看婷婷 | 欧美日免费三级在线| 欧美美女一区二区在线观看| 日韩精品专区在线| 国产精品免费视频观看| 亚洲成人一区在线| 韩国女主播成人在线| 一本久久a久久精品亚洲 | 午夜不卡av在线| 久久99久久99小草精品免视看| 成人国产亚洲欧美成人综合网| 色偷偷久久人人79超碰人人澡 | 亚洲电影中文字幕在线观看| 麻豆91小视频| 99久久免费精品高清特色大片| 欧洲精品一区二区| 久久久亚洲国产美女国产盗摄 | 亚洲第一狼人社区| 国产福利不卡视频| 欧美日韩视频专区在线播放| 国产亚洲综合在线| 亚洲成人福利片| 福利一区二区在线观看| 制服丝袜亚洲色图| 亚洲国产日韩一级| 国产福利视频一区二区三区| 欧美日韩精品欧美日韩精品一综合| 精品国产自在久精品国产| 亚洲视频香蕉人妖| 久久99精品视频| 欧美午夜免费电影| 中文字幕欧美日韩一区| 奇米综合一区二区三区精品视频| 91美女精品福利| 久久综合九色欧美综合狠狠| 午夜欧美在线一二页| 99久久综合色| 久久色视频免费观看| 香蕉影视欧美成人| 99精品一区二区| 337p日本欧洲亚洲大胆色噜噜| 亚洲一区中文日韩| 白白色亚洲国产精品| 久久尤物电影视频在线观看| 天天综合日日夜夜精品| 91久久精品一区二区| 日本一区二区综合亚洲| 老司机午夜精品99久久| 3d成人动漫网站| 亚洲综合成人在线视频| 色综合久久久久综合体| 国产精品国产三级国产有无不卡| 国产一区二区三区黄视频 | 一区二区欧美国产| 高清不卡在线观看| 久久日韩精品一区二区五区| 蜜乳av一区二区| 欧美久久久久免费| 亚洲成人免费在线| 欧美日韩一区二区电影| 一区二区国产视频| 91一区一区三区| |精品福利一区二区三区| 成人精品一区二区三区四区| 久久婷婷久久一区二区三区| 精品中文av资源站在线观看| 欧美第一区第二区| 久久精品国产秦先生| 欧美www视频| 精品无人码麻豆乱码1区2区| 欧美岛国在线观看| 国产一区二区三区日韩 | 国产一区二区三区高清播放| 欧美成人福利视频| 国产一区二区在线电影| 久久久久久久久伊人| 成人在线视频一区| 亚洲欧美在线视频观看| 一本色道亚洲精品aⅴ| 一区二区三区视频在线看| 在线观看亚洲成人| 婷婷综合在线观看| 日韩欧美国产午夜精品| 国产在线播放一区三区四| 亚洲国产精品成人综合色在线婷婷| 成人免费精品视频| 一区二区三区欧美亚洲| 欧美日韩国产综合草草| 免费在线观看成人| www日韩大片| 不卡一区二区中文字幕| 亚洲宅男天堂在线观看无病毒| 欧美国产综合一区二区| eeuss鲁片一区二区三区| 亚洲三级小视频| 欧美日韩中字一区| 久久精品国产亚洲高清剧情介绍| 久久伊99综合婷婷久久伊| 成人天堂资源www在线| 亚洲人成电影网站色mp4| 911精品国产一区二区在线| 精品在线亚洲视频| 国产精品久久久久影视| 欧美亚洲高清一区| 久88久久88久久久| 亚洲人精品午夜| 7777精品伊人久久久大香线蕉经典版下载 | 《视频一区视频二区| 欧美精品成人一区二区三区四区| 国产在线精品一区二区| 亚洲精品视频免费看| 日韩三级免费观看| 99re热视频精品| 日韩和的一区二区| 亚洲国产精华液网站w| 欧美日韩精品是欧美日韩精品| 韩国一区二区在线观看| 亚洲欧美日韩一区二区| 日韩午夜电影av| 99re成人精品视频| 蜜桃精品在线观看| 亚洲女人的天堂| 欧美精品一区二区三区高清aⅴ | 亚洲国产另类精品专区| 久久免费视频色| 欧美日韩中文字幕一区二区| 国产一区二区三区久久悠悠色av| 一区二区视频免费在线观看| 精品99久久久久久| 欧美视频中文一区二区三区在线观看 | 免费成人美女在线观看.| 国产精品色眯眯| 日韩一区二区在线看| 一本色道久久综合亚洲aⅴ蜜桃| 激情图片小说一区| 亚洲一区二区精品3399| 亚洲国产电影在线观看| 日韩欧美中文字幕一区| 91在线播放网址| 国产激情一区二区三区| 日本欧美一区二区三区乱码| 亚洲日本免费电影| 国产亚洲精品福利| 欧美一区二区视频在线观看| 99re亚洲国产精品| 国产激情91久久精品导航| 秋霞国产午夜精品免费视频| 一区二区三区四区不卡视频| 欧美激情综合五月色丁香| 日韩三级伦理片妻子的秘密按摩| 欧美色综合天天久久综合精品| 福利一区在线观看| 国产乱码精品一区二区三| 日韩经典中文字幕一区| 亚洲免费伊人电影| 亚洲欧洲美洲综合色网| 久久久www免费人成精品| 日韩一区二区三区高清免费看看| 91久久香蕉国产日韩欧美9色| 狠狠v欧美v日韩v亚洲ⅴ| 视频一区视频二区在线观看| 一区二区三区国产豹纹内裤在线| 日韩高清不卡在线| 亚洲成人一区二区| 亚洲精品美国一| 亚洲精品综合在线| 亚洲视频一二三区| 日韩理论片网站| 中文字幕欧美一区| 亚洲视频在线一区二区|