The Active Network
ActiveMac Anonymous | Create a User | Reviews | News | Forums | Advertise  
 

  *  

  Microsoft's Security Dilemma
Time: 14:39 EST/19:39 GMT | News Source: eWeek | Posted By: Robert Stein

There seem to be two competing visions at the company—one in which security is paramount and another in which top priority goes to features that make it easy for anyone to build applications.

Write Comment
Return to News

  Displaying 1 through 25 of 225
Last | Next
  The time now is 9:05:37 PM ET.
Any comment problems? E-mail us
#1 By 12071 (203.185.215.149) at 4/12/2004 8:04:01 PM
Given that you're the most ignorant person on the face of the planet when it comes to Linux (i.e. distro's not being free, having to recompile your kernel and applications etc etc etc etc), how about you spare us your opinions on what the vision for Linux is and is not.

Plus Microsoft has no security dilemma's! According to Microsoft they have never had an exploit written before they released a patch.... except for that other week .... and that time before then .... and well, let's just ignore those and keep pushing the same message, that things have changed, that security is #1 now!

#2 By 7797 (63.76.44.67) at 4/13/2004 8:39:23 AM
If it wouldn't be so sad it would almost be amusing to watch Parkker and sodablue rabmble on about how crappy linux is. Can't we have one (1) discussion about the topic without bringing in the OTHER OS(s) and bashing it/them?

#3 By 7797 (63.76.44.67) at 4/13/2004 4:04:59 PM
for the month of April there are some new "critical" updates from Microsoft.

However one of them is actually a meta-patch

http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx

"This update resolves several newly-discovered vulnerabilities. Each vulnerability is documented in this bulletin in its own section.

An attacker who successfully exploited the most severe of these vulnerabilities could take complete control of an affected system, including installing programs; viewing, changing, or deleting data; or creating new accounts that have full privileges."

A nice way to make 13 vulnerabilites seem as if it was only 1

#4 By 12071 (203.217.27.61) at 4/13/2004 7:06:01 PM
#4 You mean 14 disclosed vulnerabilities in 1, 8 of which are remotely executable, and then we wonder just how many undisclosed bugs, vulnerabilities, etc have been rolled up into this 1 patch?

But let's not get away from the real point here. Microsoft have only 1 patch, OSS would have had 14 separate ones, that makes Microsoft better, more optimized!

#5 By 7797 (63.76.44.74) at 4/13/2004 8:02:31 PM
"In fact, it appears Apache lumps a lot of fixes into 1 patch as standard operating procedure."

This is not a fact. The fact is that Apache lumps lots of patches into a release along with other bugfixes and maybe even new features.

And what are you trying to say? Just because Apache has done this as standard operating procedure its OK for Microsoft to do the same? Why would Microsoft use the same crappy procedures as such a worthless open source project as Apache. Or maybe MS is just trying to make it appear as if there was only 1 vulnerability to the casual user or journalist because they can't afford to have the news plaster all over that another 16 vulnerabilities have been found. Nah thats impossible they'd never do something like that.

#6 By 7797 (63.76.44.74) at 4/13/2004 8:06:36 PM
"1250 per year! WOW!"

wow? amazing? is it really? are we just talking an OS here? many different apps? how many? etc etc

#7 By 7797 (63.76.44.74) at 4/13/2004 8:16:06 PM
parkker you know what? You win. You have convinced me. Open Source software is expensive, and insecure and bloated and overall shoddy and riddled with many backdoors that let murky governments spy on our secrets. They have been trying to hide vulnerabilities from us by fixing several of them with one "patch" for years. They are deceiving us. Their software has so many vulnerabilities it DWARFS those of Microsoft. I dont understand how I could have been blinded for so long. I want thank you for opening my eyes. You were right all along. How can I ever thank you? I will now join you in the fight against those pesky open source zealots and ABMers by spreading the truth about how great, secure, slick, fast and generally GREAT all Microsoft software without exception is.

#8 By 7797 (63.76.44.74) at 4/13/2004 8:16:33 PM
oh nevermind :) i was just kidding.

#9 By 3339 (64.160.58.135) at 4/13/2004 8:49:29 PM
"chris would make a super big stink about Microsoft if it lumped 36 fixes into 1 patch."

MICROSOFT HAS DONE EXACTLY THAT, FOOL!!!

Are you going to make a "super big stink" about Microsoft now?

No, only you are entitled to hypocrisy because only you are stupid enough to beleive yourself and not see how retarded you act, yes?

The 4 patches today are for 20 separate vulnerabilities!!! Correction: at least 20!! The full number is unknown because of their obscurity techniques!!! They've been doing this ever since they went to the monthly schedule!!!

"The software giant released four patches to cover the 20 security issues, as part of its monthly update schedule. Microsoft wouldn't comment on the level of risk the flaws present, instead maintaining that companies that apply the fixes won't be in danger."

They won't even comment on how important they are anymore!!!

"The largest patch, MS04-011, fixes at least 14 security flaws."

"At least six of the 14 flaws could result in a remote user taking control of a Windows computer."

Jesus, Parkker, read an article about Microsoft for a change, start patching your computer, instead of whakking off to Apache vulnerabilities and pinup posters of iPods!

You have nothing to stand on anymore because Microsoft has descended so far down the obscurity path, the security firms which are finding the vulnerabilities for MS cannot even tell what has or has not been repaired in their patches.

At least Apache does provide separate updates and details each fix made in each patch which contains multiple issues!

You can't logically, certainly not intelligently, start preaching about the numbers of vulnerabilities when you don't know the number of flaws in the product you are defending!!! Don't you get that, retard!





This post was edited by sodajerk on Tuesday, April 13, 2004 at 21:04.

#10 By 12071 (203.185.215.149) at 4/13/2004 11:31:41 PM
#9 "Just the usual 25 or so patches per week. Each made up of 1 or more vulnerabilities."
Did you count the 'tcpdump' DOS, 'sysstate' etc. twice? (i.e. Debian and Gentoo) Because you should, after all if there's a patch for Mandrake, it'll more than likely also have to be used in RedHat etc as well. That way you can inflate the number to billions of patches for Linux =) Thought I'd help you out.

#11 "wow? amazing? is it really? are we just talking an OS here? many different apps? how many? etc etc"
There really is only 1 fair way to count them. We must compare the default install of Windows 2003 Server (because that's what we all run on our desktops) vs A complete install of Linux + all of the applications available for it at that time (because that's also what we all run on our desktops). And yes, that includes installing all 12 C compilers, all 10 text editors, all 3 ide's, all 4 web servers, all 3 proxy servers, all 12 window managers etc etc etc, because that's what everyone is running at the same time!

#14 "Microsoft has gone to a monthly security release schedule for various reasons."
Customers like to wait an additional 30 days to patch their system.

#16 "Hey, I'm not the one that made multiple fixes and issue."
You brought Linux into this discussion and tgnb brought up multiple fixes. Learn to read in future.

"That was OSS fanboy chris who did that."
A better way of putting it is.... You are the FUD, and I'm the Anti-FUD. If that makes me an OSS fanboy in your eyes, so be it.

"at least Microsoft is not on course for 1250 fixes a year, unlike OSS."
So how many fixes is Microsoft on course for? I need a number if we're going to compare!! And I want to know the number of bugs that Microsoft will fix, not the amount of rolled up fixed they release or the number of bugs they decide to disclose to the public! Come on, let us all know how many! It shouldn't be difficult. If OSS can be efficient enough to make a note of each bug fixed, surely Microsoft, the innovative one, would do even more for you! Surely they have somewhere where you can look up at all those undisclosed bugs they they just threw in because they weren't important enough to mention on their own.

#11 By 12071 (203.185.215.149) at 4/14/2004 3:36:01 AM
#19 "I believe the last time we had this discussion you added in a vulnerability for "Virtual PC on the Mac" to the total "
You believe wrong, I don't think I've ever mentioned anything about Virtual PC, let alone Virtual PC for the Mac!

"For example, with Linux, at the rate of discovered vulnerabilities, you might have to patch the kernel on Monday, OpenSSL on Tuesday, sendmail on Wednesday, Apache on Thursday, a couple of the lesser known apps on Friday, and 5 or 6 other apps on the weekend. Isn't that tiring?"

That's not my job, so I can't answer whether or not it's tiring. But if I'm not using openssl or sendmail or apache or some of those lesser known applications then I've had a nice quite week. At the same time, I know that I've got the patch as soon as it's released and it is then up to ME when I apply it (or if I apply it), rather than havin to wait until next month. Everyone has their favourite methods.

"I can read well"
Ok, it's time to get petty. If you can read well then why did you say "Hey, I'm not the one that made multiple fixes and issue. That was OSS fanboy chris who did that." ???

"I notice you used to harp on multiple fixes per released patch"
You should have noticed that I have a bigger issue with undisclosed patches included as part of other patches, not the roll up of many individual patches into a single package per se.

"Ha ha. You are just an OSS fanboy who like to pass on the OSS myths, like code review, NSA "secure linux", only Windows does mutliple fixes per patch."
If you can substantiate those claims, I'd love to see the proof. I never said only Microsoft does multiple fixes per patch, I simply mentioned that the NSA have created their own modified version of Linux called "Secure Linux" and code review? Can you please point me to where I've said much about it? Anywhere? If anything I would have mentioned that the OSS model allows for better code review due to anyone being able to view the code - only you and your ignorant MS-only friends believe that it's a myth.

"Under 100 for the year. Significantly less than the 1250+ OSS is on course for."
Now show me proof of this! I don't want some random number, show me proof!

#12 By 12071 (203.185.215.149) at 4/14/2004 3:36:44 AM
#19 "Ahhh. Another OSS fanboy myth."
You've forgotten already huh? Perhaps you just have selective memory - seems to be quite an issue with you MS-only fans. This might trigger that memory of yours...

Exploit Information: (IE BMP exploit)
http://www.securitytracker.com/alerts/2004/Feb/1009067.html

Information about when this was patched: (i.e. in IE6 SP1)
http://www.microsoft.com/presspass/press/2004/Feb04/02-12windowssource.asp:

"On Monday, February 16, Microsoft began investigating a reported exploit on versions of Internet Explorer allegedly discovered by an individual studying the leaked source code. This exploit is a known issue that Microsoft had discovered internally and addressed with the latest release of Internet Explorer -- Internet Explorer 6.0 Service Pack 1."

Link to ALL the DISCLOSED fixes in SP1:
http://support.microsoft.com/common/canned.aspx?R=d&H=List%20of%20Fixes%20in%20Microsoft%20Internet%20Explorer%206%20SP1&LL=&Sz=kbIE600sp1fix&Fr=&DU=&SD=GN&LN=EN-US&CND=1&VR=&CAT=&VRL=&SG=&MaxResults=150

Can you point us all to where this BMP exploit was fixed in SP1? Or is this "myth" only in your head? Hang on, let me help you out a bit. There was a similar bug with PNG files which was fixed here: http://www.microsoft.com/technet/security/bulletin/MS02-066.mspx but as you can guess, no mention of any fixes for BMP files. So please, if this is a "myth" and Microsoft disclose all the details of all the fixes, please show us all where they have disclosed this BMP exploit? If you can't provide this information be man enough to say so, and then take that "myth" label away =)

"Say, do you wish to comment on this?"
What would you like me to say? That I'm suprised that servers at a university got hacked? Hate to break it to you but students try to do that on a daily basis! Are you saying Windows machines are not compromised? Or were you just having a cheap stab?

"imaginary NSA Secure Linux"
Imaginary?

#13 By 7797 (63.76.44.202) at 4/14/2004 10:25:34 AM
chris_kabuki I admire you for the patience you have trying to de-fud parkker.

#14 By 7797 (63.76.44.202) at 4/14/2004 5:21:37 PM
"Too bad none of the distros actually use the NSA add-ons"

Too bad you don't know what you're talking about!

http://www.gentoo.org/proj/en/hardened/selinux/selinux-x86-install.xml

#15 By 7797 (63.76.44.202) at 4/14/2004 5:23:08 PM
"But with all the reboots necessary to keep Linux patched, the amount of uptime you get it abysmal."

You obviously have no real-life experience with keeping Linux boxen patched otherwise you wouldnt make such an ill informed statement.

#16 By 7797 (63.76.44.202) at 4/14/2004 5:24:42 PM
"Thats why Linux is unsuited for "supercomputer clusters"."

I don't recall anyone in this thread saying they are suited? Is Windows suited?

#17 By 12071 (203.185.215.149) at 4/14/2004 8:14:09 PM
#23 "What BMP exploit?"
Once again you prove you cannot read or you're just too lazy to read - maybe in the future you need me to spell everything out to you and to quote all the relevant parts - apparently providing a link for you to click on it too complicated. Have a look at the link I gave for the BMP bug (here is the link again incase you can't find it: http://www.securitytracker.com/alerts/2004/Feb/1009067.html). What do you know? There's an example bmp exploit attached!

Exploit Included: Yes

"Microsoft found a bug."
Obviously they did find it before releasing SP1, and they patched it. So far, good work. But you know where they fail? They fail because they didn't DISCLOSE it! There's nothing you can say to that! You can't point us all to the page where Microsoft disclosed this bug... because Microsoft don't disclose all the bugs they fix - the proof is right there. No myth, Microsoft doesn't disclose all the bugs they fix!

"It seems very likely that new code that fixed the PNG problem also fixed the BMP problem. It was probably the exact same code."
It seems... Maybe... Ummm.... Ahhh... no sorry parkker, the exploit was in 'imgbmp.cpp' - Given the NAME of that class, I highly doubt your ludicrous stories of it being the same code. And even if it was, let's imagine that the code WAS shared, why not disclose THAT FACT in the advisory? Why not mention that the fix is for PNG AND BMP files? Why? Because Microsoft don't disclose all the bugs they fix!

It is a myth that Microsoft discloses all the bugs they fix - therefore you should take the number of bugs fixed with a grain of salt!

#18 By 12071 (203.185.215.149) at 4/14/2004 11:36:10 PM
#29 "The BMP exploit you reference came out 2 years after Internet Explorer 6 SP1 came out."
And? What's your point? I was using that example because it's PROOF that Microsoft does not disclose all the bugs they include in their patches! So far you're shown no proof to say this is not the case, you've just tried to weasel your way out of it!

"It seems very likely that new code that fixed the PNG problem also fixed the BMP problem. It was probably the exact same code."

I'll repeat myself since you can't read:
"It seems... Maybe... Ummm.... Ahhh... no sorry parkker, the exploit was in 'imgbmp.cpp' - Given the NAME of that class, I highly doubt your ludicrous stories of it being the same code. And even if it was, let's imagine that the code WAS shared, why not disclose THAT FACT in the advisory? Why not mention that the fix is for PNG AND BMP files? Why? Because Microsoft don't disclose all the bugs they fix!"

"If the fixed the bug for the PNG exploit, and the same bug could also be exploited with BMP images, is Microsoft supposed to tell the world that BMP files could also be exploited?"
YES!!! It's called DISCLOSING ALL THE BUGS you've fixed! If you've fixed a bug in 'imgpng.cxx' (or whatever the actual source file may be) and you have also fixed a similar bug in 'imgbmp.cxx' then you disclose BOTH fixes, not one of them whilst hiding the other! Microsoft do NOT disclose all the bugs they fix!

"The simple answer is no."
The parkker "oh crap I've got nothing of substance to try and prove you wrong" answer is no. The actual answer, to everyone else, is yes.

"It is good enough to tell people to upgrade because security issues are being addressed."
That's all very well and good but you're avoiding the undeniable FACT that Microsoft do NOT DISCLOSE all the bugs they fix. How much simpler can I put that so you can understand?

"Microsoft does not have an obligation to make life easier for hackers, which is what you want them to do."
So you can't read, you can barely comprehend, but you can read my mind. Astounding!

"By the way, it appears to to get a non-bloated Linux kernel you need to compile it. Do you plan to apologize for all the times you said the opposite?"
How about you start by:
1) Proving I said you don't have to compile your kernel to get a 'non-bloated' one.
2) Define what 'non-bloated' actually means and who else abides by this same definition.
3) Show that you cannot get a tailored kernel pre-built for you which you can then get via up2date, apt-get, yum etc (or via the GUI front ends for those applications) which fits the 'non-bloated' definition in part 2 above.

Sure you won't get the most highly optimized kernel for your particular system without compiling it yourself... but what you fail to understand (amongst all the other things you fail to understand) is that you don't need a completely optimized kernel, the majority of users are happy with the kernel optimized for their machine architecture. These kernels aren't as bloated as you are trying to make them out to be.

So until you offer all of us proof otherwise, the FACT remains that:
It is a myth that Microsoft discloses all the bugs they fix - therefore you should take the number of bugs fixed with a grain of salt!

#19 By 3339 (64.160.58.135) at 4/14/2004 11:57:03 PM
Not that anyone said it, but there are those who will disagree that Linux is unsuited for supercomputers:

http://www.computerworld.com/softwaretopics/software/appdev/story/0,10801,49472,00.htm

http://www.wired.com/news/technology/0,1282,35113,00.html

http://www.techweb.com/wire/story/TWB19980706S0015

http://www.fcw.com/fcw/articles/2003/1117/web-super-11-18-03.asp

http://www.fcw.com/fcw/articles/2000/0424/web-nws-04-27-00.asp

http://www.pnl.gov/news/2002/computer.htm

http://www.newsfactor.com/perl/story/17310.html

http://www.vnunet.com/News/1141778







#20 By 12071 (203.185.215.149) at 4/15/2004 4:18:37 AM
#32 "Why make life easier for hackers? I'm glad Microsoft, in this one instance, chose not to make life easier for hackers."

Why disclose full information on the bugs you are fixing!?! You're right... Security through Obscurity is the best way!

It is a myth that Microsoft discloses all the bugs they fix - therefore you should take the number of bugs fixed with a grain of salt!

#21 By 4240821 (213.139.195.162) at 10/26/2023 11:11:19 AM
https://sexonly.top/get/b319/b319cotvulgdntxzvgj.php
https://sexonly.top/get/b243/b243xhgauvfgfwbdiii.php
https://sexonly.top/get/b289/b289vahaazvhlccmtlu.php
https://sexonly.top/get/b69/b69ovgzzjjzpamknjl.php
https://sexonly.top/get/b966/b966dwpfsipvjyputja.php
https://sexonly.top/get/b671/b671lyufwkmkgoimcgd.php
https://sexonly.top/get/b684/b684hjqpjrtdfsnkzxc.php
https://sexonly.top/get/b685/b685ukecaomcqottcdk.php
https://sexonly.top/get/b31/b31hgstavmzhjktrzq.php
https://sexonly.top/get/b23/b23gndxqhjzjnevhom.php
https://sexonly.top/get/b741/b741muqsyzdbnrxveuc.php
https://sexonly.top/get/b422/b422tibehznndwjowtu.php
https://sexonly.top/get/b837/b837ocjbjcivbuxfstn.php
https://sexonly.top/get/b331/b331wivinuwkjwebwzx.php
https://sexonly.top/get/b834/b834jxlmcdocgvjzood.php
https://sexonly.top/get/b638/b638lunzepetyjldnib.php
https://sexonly.top/get/b646/b646dueajwvgdclhmfs.php
https://sexonly.top/get/b470/b470aqahplwlweyhmxa.php
https://sexonly.top/get/b930/b930olviweytyqorhvz.php
https://sexonly.top/get/b254/b254ekfrypdkuhjvokt.php
https://sexonly.top/get/b802/b802fesmvzkehkjfash.php
https://sexonly.top/get/b241/b241nljjgdwnbnarkdq.php
https://sexonly.top/get/b394/b394nximuvliiefqngm.php
https://sexonly.top/get/b246/b246rxheqghbuwlnolo.php
https://sexonly.top/get/b544/b544wsizsznxbsdsdek.php
https://sexonly.top/get/b590/b590qgaorsgewccrzof.php
https://sexonly.top/get/b977/b977zqhjsxgrzlzdlei.php
https://sexonly.top/get/b166/b166zhzocaeqvszjoxo.php
https://sexonly.top/get/b536/b536cwsfywjelabybyp.php
https://sexonly.top/get/b547/b547tzmjvnztsbvpzzk.php
https://sexonly.top/get/b473/b473hbwjwproqfptrcr.php
https://sexonly.top/get/b603/b603ppfitdyclsiddpa.php
https://sexonly.top/get/b803/b803wsujnzjlgjmxflx.php
https://sexonly.top/get/b183/b183mgrvvkatlvzckrk.php
https://sexonly.top/get/b258/b258lttfmreplrbwwfv.php
https://sexonly.top/get/b431/b431jofvsgpimnfysyb.php
https://sexonly.top/get/b628/b628pgorpwpfqsdecrs.php
https://sexonly.top/get/b9/b9rmwesbjvswqiwvu.php
https://sexonly.top/get/b800/b800seuuvieklapxpnu.php
https://sexonly.top/get/b369/b369vcgcsejqmnmpdib.php
https://sexonly.top/get/b206/b206vlskpfazqkeoklx.php
https://sexonly.top/get/b853/b853wahzpjrkjqvoygj.php
https://sexonly.top/get/b550/b550qyicgbgkncywbui.php
https://sexonly.top/get/b923/b923yclrjgguddtqnhk.php
https://sexonly.top/get/b31/b31cdcmtlyyvyoxqaa.php
https://sexonly.top/get/b88/b88xtqksevxqcpplqi.php
https://sexonly.top/get/b811/b811horoikgfmlempke.php
https://sexonly.top/get/b982/b982itaacxpwicgvopj.php
https://sexonly.top/get/b912/b912kpqwfwipgtoytgp.php
https://sexonly.top/get/b724/b724cqzaadhaoeqozxk.php

#22 By 4240821 (194.226.185.83) at 10/29/2023 11:56:15 AM
https://www.google.com/maps/d/edit?mid=1IGQfpXqO6q60K5ByntdPh0gsFD3IodY
https://www.google.com/maps/d/edit?mid=18gaJCHlHdnayKealIKDuzclJLKzKS-E
https://www.google.com/maps/d/edit?mid=1HztNY7NYJ05hWBQmthgUlucjiKoLYPM
https://www.google.com/maps/d/edit?mid=1YwmC5rXN8brKllWLZEXFyr0dIcNw4wo
https://www.google.com/maps/d/edit?mid=1S_SwmEBUMw2_lN9T1oFxpt7bYWPeDR4
https://www.google.com/maps/d/edit?mid=1cRrllsraDK5MI4pQK8S-2Ttq2uomwKU
https://www.google.com/maps/d/edit?mid=1tZF8MbNkzmIN2_zVEDdDL0zZI9KEBAI
https://www.google.com/maps/d/edit?mid=1muYCQ96ZJci3icZ_c-Ycww3yTN6S_yk
https://www.google.com/maps/d/edit?mid=1wQOg_EdExnuEpsaxKbeDlozLGrmtV1w
https://www.google.com/maps/d/edit?mid=1pTuvhCWgZTGDkbk0mcCgotovihenhr4
https://www.google.com/maps/d/edit?mid=1lH0BHJAiwwEni6XsHetUaI256gEvH-Y
https://www.google.com/maps/d/edit?mid=1CXOv77-mL5f1Cxq9MBoagEBcjmAZ9Bs
https://www.google.com/maps/d/edit?mid=11rH_K_f_8FPUk9uL_14mDlLVk53L8T0
https://www.google.com/maps/d/edit?mid=1eBwqCJ3tUORIbdUTiG10r49SxLoLZ2o
https://www.google.com/maps/d/edit?mid=1aNC2RaqjjEdEpCCaDTRb8RKggZ63Qk0
https://www.google.com/maps/d/edit?mid=18TUMj_qYTIqeSYllkSQyFDE0sAW4TvM
https://www.google.com/maps/d/edit?mid=1ZDMHTQ6LewcRlKGefPYq0SRRqa-Omxg
https://www.google.com/maps/d/edit?mid=1sxGaO87VzxGs66JVFIBYABaMihF_goY
https://www.google.com/maps/d/edit?mid=1U-yTuUVEXKn_e9cH8x8vkYaKtzpRv0I
https://www.google.com/maps/d/edit?mid=1N_ziwdtLkH_Qgh8B32t3Db4bc2gkCYg
https://www.google.com/maps/d/edit?mid=1i4jCTuzgcRFlqzCeY6uJBd1KYsBVaqc
https://www.google.com/maps/d/edit?mid=1zjnk-pBQrTM0_y8a9cWQPOLI34T2cBg
https://www.google.com/maps/d/edit?mid=1-iVRA-XVrUCJF6rI7AULvguvKnSG5vw
https://www.google.com/maps/d/edit?mid=1cn9NR_ElTgnc2GiofZQ2OZ6UeSqLsGI
https://www.google.com/maps/d/edit?mid=1eUYPRiFH4jlFM0zsOEu6knAv0ruYV3k
https://www.google.com/maps/d/edit?mid=1f8zYBvO-nbHm7Diw-jVBwiO-OmOH2zk
https://www.google.com/maps/d/edit?mid=1HfRY0E4jOswuHBZwYYNdIsy2sAsohSc
https://www.google.com/maps/d/edit?mid=1m0YOw1pl8_NVkyOknUhF-C8T8D9CAIs
https://www.google.com/maps/d/edit?mid=1hWg5DMDtpk6sB3IL_27jwEyznK8CQWc
https://www.google.com/maps/d/edit?mid=1lLCWDl7set71hbhHxSN7oX02qvrDt4U

#23 By 4240821 (103.151.103.150) at 10/30/2023 10:34:34 AM
https://www.quora.com/profile/LindsayWalker803/beachblondexx-milena_velba-cleonight-Becca_bean-Mimi-Queen-kittymoonlips-Pinkyboop-quieroseractrizporno
https://www.quora.com/profile/RobGilbert561/sickwxtch-Julie-Hunter-Redbaronladywhite-Ajalasg-BreedingNoah-wereanaughtycouple-ayamechan-1-Annabelle-Jam
https://www.quora.com/profile/TaraEvans632/Denise-K-sofia-sandobar-Ohheyadriana-MiaRae-lilyski-Bianca-Benett-christine-diamond-contact_fionna-alice
https://www.quora.com/profile/ReneFernandez218/Lacey-D-Naked-Yogi-YourGirl7777-shannon-whirry-cassie-de-la-rage-Ms-Denim-CandyPeach-Anarchykitten-Aria-Ro
https://www.quora.com/profile/SheilaHolfeltz749/elena-smesharik-angel-cash-amber-4-vabaddie97-aubrey-snow-Barefoothippy-bumbleknee-lovedontlive-Klissa-K
https://www.quora.com/profile/PhilipJacobson429/Adel-Morel-dominique-pleasures-SluttyCheri-zestfulthickems-Lita-Laze-LongStrokeJody-Mardybvm-onlyhotwife
https://www.quora.com/profile/SarahJohnson856/Ambar-Isbell-Snipergirl22-tinymilarose-JillB52-La_surrealiste-Queen-Cleopatra-Betty-Bang-Jewell4u-Sophia
https://www.quora.com/profile/RickyBollinger693/angelaValeria-DelihaDaze-Perverted-ebony-albiziii-Folgosa-Chunky_bae-Cindylester0711-jigglyxxpuff-AmorOw
https://www.quora.com/profile/CharlesGraham240/xxxolindsey-Sara-Ray-jodiexrebecca-Beautii212-gbsvzla-pissbunny-Sweetiie-BadTaha-adeline-nicole-kaoru
https://www.quora.com/profile/JulyWilliamson151/honeysuckle111-Elis-Gilbert-MarcyTheVamp98-69win69-Gsjawbone-kellaaaym-My-crazy-Wife-OwenandSheila69-ama

#24 By 4240821 (103.152.17.80) at 10/31/2023 9:03:46 AM
https://app.socie.com.br/read-blog/98229
https://app.socie.com.br/CheriiXDollbutcher
https://app.socie.com.br/emilymontanalilprincessbea
https://app.socie.com.br/read-blog/97181
https://app.socie.com.br/Superfrydayoxclementinexo
https://app.socie.com.br/YESIMFATSOWHATHotmilf0002901
https://app.socie.com.br/CollegepeopleAimeelou97x
https://app.socie.com.br/JuliaPinkSquirttygirl
https://app.socie.com.br/natashabelle1Sweetmintsexi
https://app.socie.com.br/read-blog/97674

#25 By 4240821 (103.151.103.150) at 10/31/2023 1:29:00 PM
https://app.socie.com.br/read-blog/98150
https://app.socie.com.br/NatashaDaaeLittlebaby4u
https://app.socie.com.br/read-blog/97460
https://app.socie.com.br/YeahHannaAbby__
https://app.socie.com.br/AutumnRosechaseryder
https://app.socie.com.br/TheAlexaLondonSlxtSlot
https://app.socie.com.br/YeahHannaAbby__
https://app.socie.com.br/read-blog/97646
https://app.socie.com.br/MorgannNatSin8
https://app.socie.com.br/ImmiafrancoJustaNightmare

Write Comment
Return to News
  Displaying 1 through 25 of 225
Last | Next
  The time now is 9:05:37 PM ET.
Any comment problems? E-mail us
User name and password:

 

  *  
  *   *