Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[thepiratebay] Exception (thepiratebay): Ssl error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE at /build/mono-5.4.1.6/external/boringssl/crypto/ec/ec.c:835: An error occurred while sending the request (Test) #2173

Closed
cpaucar3 opened this issue Nov 21, 2017 · 7 comments

Comments

@cpaucar3
Copy link

---Can't connect to any trackers----

Server may have gone through an unexpected shutdown during an upgrade on 10/23 and so I ran
sudo apt-get install libcurl4-openssl-dev bzip2 mono-devel -y --reinstall and installed the latest release from here: https://github.com/Jackett/Jackett/releases/tag/v0.8.402

upgrading from v0.8.300.0. I grabbed any missing CA certificates (below) I changed my systemd script to a non-root user. Nothing seems to get the trackers working. It worked perfectly fine for over a year until now. Any thoughts?

root@odroid64:/root/.config/Jackett# wget -O - https://curl.haxx.se/ca/cacert.pem | cert-sync /dev/stdin
--2017-11-20 20:45:19-- https://curl.haxx.se/ca/cacert.pem
Resolving curl.haxx.se (curl.haxx.se)... Mono Certificate Store Sync - version 5.4.1.6
Populate Mono certificate store from a concatenated list of certificates.
Copyright 2002, 2003 Motus Technologies. Copyright 2004-2008 Novell. BSD licensed.
151.101.22.49, 2a04:4e42:5::561
Connecting to curl.haxx.se (curl.haxx.se)|151.101.22.49|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 236061 (231K) [application/x-pem-file]
Saving to: ‘STDOUT’
2017-11-20 20:45:19 (1.82 MB/s) - written to stdout [236061/236061]
Importing into legacy system store:
I already trust 143, your new list has 143
Import process completed.
Importing into BTLS system store:
I already trust 142, your new list has 143
Certificate added: C=IL, O=StartCom Ltd., OU=Secure Digital Certificate Signing, CN=StartCom Certification Authority
1 new root certificates were added to your trust store.
Import process completed.

Jackett version: 0.8.402.0
System: Ubuntu 16.04.3 LTS (GNU/Linux 3.14.79-116 aarch64)
root@odroid64:~# mono --version
Mono JIT compiler version 5.4.1.6 (tarball Wed Nov 8 21:48:40 UTC 2017)
Copyright (C) 2002-2014 Novell, Inc, Xamarin Inc and Contributors. www.mono-project.com
TLS: __thread
SIGSEGV: normal
Notifications: epoll
Architecture: arm64
Disabled: none
Misc: softdebug
LLVM: supported, not enabled.
GC: sgen (concurrent by default)


log.txt
updater.txt

@kaso17
Copy link
Collaborator

kaso17 commented Nov 22, 2017

I suspect this might be a boringssl bug affecting elliptic curve certificates specific to the aarch64/arm64 platform. I'm running the same mono version on x64 without this issue.

Can you please run the following commands and post the output:

openssl s_client -connect thepiratebay.org:443

csharp -e 'Console.WriteLine (new System.Net.WebClient().DownloadString("https://www.howsmyssl.com/").IndexOf ("1.2"))'

csharp -e 'Console.WriteLine (new System.Net.WebClient().DownloadString("https://thepiratebay.org/").IndexOf ("html"))'

@kmr2319
Copy link

kmr2319 commented Nov 26, 2017

This is from an Asus Tinkerboard.

I'm having some problems with TPB on both the tinkerboard ARMBIAN and my x64 Ubuntu. Not sure if I'm getting these errors though... But figured it could hurt to post the output.

x64 output is the same less the Got a bad hardware address length for an AF_PACKET 16 8 message.

user@tinker:~$ openssl s_client -connect thepiratebay.org:443
CONNECTED(00000003)
depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root
verify return:1
depth=2 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO ECC Certification Authority
verify return:1
depth=1 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO ECC Domain Validation Secure Server CA 2
verify return:1
depth=0 OU = Domain Control Validated, OU = PositiveSSL Multi-Domain, CN = ssl778319.cloudflaressl.com
verify return:1
---
Certificate chain
 0 s:/OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=ssl778319.cloudflaressl.com
   i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
   i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Certification Authority
 2 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Certification Authority
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIEAjCCA6igAwIBAgIQPIrqZBVWfvzcBY8t04ePZzAKBggqhkjOPQQDAjCBkjEL
MAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE
BxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxODA2BgNVBAMT
L0NPTU9ETyBFQ0MgRG9tYWluIFZhbGlkYXRpb24gU2VjdXJlIFNlcnZlciBDQSAy
MB4XDTE3MDMyMzAwMDAwMFoXDTE4MDMyMzIzNTk1OVowbDEhMB8GA1UECxMYRG9t
YWluIENvbnRyb2wgVmFsaWRhdGVkMSEwHwYDVQQLExhQb3NpdGl2ZVNTTCBNdWx0
aS1Eb21haW4xJDAiBgNVBAMTG3NzbDc3ODMxOS5jbG91ZGZsYXJlc3NsLmNvbTBZ
MBMGByqGSM49AgEGCCqGSM49AwEHA0IABAIAuqZjqGiBo9vzvBlqGLWq77RDzAcz
8doibP2nrpLt1eRjr+U/Va1bHYCD69FX1w5qD1FBmZh2UZuNPRk8xEGjggIDMIIB
/zAfBgNVHSMEGDAWgBRACWFn8LyDcU/eEggsb9TUK3Y9ljAdBgNVHQ4EFgQU+wyy
a+yo9jOuhSfICKw7Gk1fOuswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAw
HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCME8GA1UdIARIMEYwOgYLKwYB
BAGyMQECAgcwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLmNv
bS9DUFMwCAYGZ4EMAQIBMFYGA1UdHwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwuY29t
b2RvY2E0LmNvbS9DT01PRE9FQ0NEb21haW5WYWxpZGF0aW9uU2VjdXJlU2VydmVy
Q0EyLmNybDCBiAYIKwYBBQUHAQEEfDB6MFEGCCsGAQUFBzAChkVodHRwOi8vY3J0
LmNvbW9kb2NhNC5jb20vQ09NT0RPRUNDRG9tYWluVmFsaWRhdGlvblNlY3VyZVNl
cnZlckNBMi5jcnQwJQYIKwYBBQUHMAGGGWh0dHA6Ly9vY3NwLmNvbW9kb2NhNC5j
b20wTAYDVR0RBEUwQ4Ibc3NsNzc4MzE5LmNsb3VkZmxhcmVzc2wuY29tghIqLnRo
ZXBpcmF0ZWJheS5vcmeCEHRoZXBpcmF0ZWJheS5vcmcwCgYIKoZIzj0EAwIDSAAw
RQIgSBaudXkcp6W+aLETAMnLWLX+SsgHtVNM4JfyjC0nIlICIQDth0WMZ/ST//tn
CA879x4xhfn2KuZPBLuspWvN22KVpw==
-----END CERTIFICATE-----
subject=/OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=ssl778319.cloudflaressl.com
issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
---
No client certificate CA names sent
Peer signing digest: SHA256
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 3429 bytes and written 431 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256
Server public key is 256 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-ECDSA-AES128-GCM-SHA256
    Session-ID: 355C1FA835A1A9E53E2BB37DC8146689AC2877DD8AC4AF391A71487E8CE35638
    Session-ID-ctx: 
    Master-Key: F93263DA8982D8F9A2D0C1432AAAA463470740CF2F1047A6A494F217A480448C8616CCFC89FB2DA12B63BD98D5D1898C
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 64800 (seconds)
    TLS session ticket:
    0000 - 8a dc d4 09 12 56 fd 3c-90 b0 11 3e f3 bb 37 65   .....V.<...>..7e
    0010 - 73 f2 f2 9a 31 6f bc 9f-54 b3 cc 75 58 4e a2 5a   s...1o..T..uXN.Z
    0020 - 9e 59 32 d0 45 35 d3 af-3d 72 fa 96 ff 3f f2 f3   .Y2.E5..=r...?..
    0030 - 2b 72 9f 6c 8f 91 a9 dd-c9 7b bc 22 bf b6 0d 12   +r.l.....{."....
    0040 - eb d7 55 1e f5 ca 45 aa-20 fe 42 b4 c4 ea fa 7a   ..U...E. .B....z
    0050 - 8e e4 c6 d4 0f 1d 02 0d-ec d1 67 8e be 4e a9 5e   ..........g..N.^
    0060 - 8e 1c 43 1c ac 52 74 c9-66 60 ca 29 1d db 63 c0   ..C..Rt.f`.)..c.
    0070 - 57 8c 2c 98 06 bb 22 2d-de 09 28 af 1e 60 85 80   W.,..."-..(..`..
    0080 - 15 2f aa 06 c0 4c 9c f8-75 28 9f 02 f8 c1 33 ec   ./...L..u(....3.
    0090 - a6 13 b1 b6 c0 93 8d fb-d7 05 9a dc b3 45 c4 18   .............E..
    00a0 - c2 76 7a ff bd aa 96 57-5f d3 99 25 38 8d 38 89   .vz....W_..%8.8.

    Start Time: 1511668841
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---
^C
user@tinker:~$ csharp -e 'Console.WriteLine (new System.Net.WebClient().DownloadString("https://www.howsmyssl.com/").IndexOf ("1.2"))'
Got a bad hardware address length for an AF_PACKET 16 8
Got a bad hardware address length for an AF_PACKET 16 8
2393
user@mrtinker:~$ csharp -e 'Console.WriteLine (new System.Net.WebClient().DownloadString("https://www.howsmyssl.com/").IndexOf ("1.2"))'
Got a bad hardware address length for an AF_PACKET 16 8
Got a bad hardware address length for an AF_PACKET 16 8
2393
user@mrtinker:~$ csharp -e 'Console.WriteLine (new System.Net.WebClient().DownloadString("https://thepiratebay.org/").IndexOf ("html"))'
Got a bad hardware address length for an AF_PACKET 16 8
Got a bad hardware address length for an AF_PACKET 16 8
10
user@tinker:~$

@cpaucar3
Copy link
Author

root@odroid64:~# openssl s_client -connect thepiratebay.org:443
CONNECTED(00000003)
depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root
verify return:1
depth=2 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO ECC Certification Authority
verify return:1
depth=1 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO ECC Domain Validation Secure Server CA 2
verify return:1
depth=0 OU = Domain Control Validated, OU = PositiveSSL Multi-Domain, CN = ssl778319.cloudflaressl.com
verify return:1
---
Certificate chain
 0 s:/OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=ssl778319.cloudflaressl.com
   i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
   i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Certification Authority
 2 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Certification Authority
   i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/OU=Domain Control Validated/OU=PositiveSSL Multi-Domain/CN=ssl778319.cloudflaressl.com
issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO ECC Domain Validation Secure Server CA 2
---
No client certificate CA names sent
Peer signing digest: SHA256
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 3431 bytes and written 431 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256
Server public key is 256 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-ECDSA-AES128-GCM-SHA256
    Session-ID: A8524BBD6D9CCC7D36364E97C0292045A5AF68D175EB5B9B692B35A35B25E912
    Session-ID-ctx: 
    Master-Key: 6624874E4B228F17D2F967AEFDAA87DAAD8BE65D78A821E2DF26162FAE1E196B86064DC045C2B48E31937AEE4CFCE13B
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 64800 (seconds)
    TLS session ticket:
    0000 - b5 2a 57 1d 2e 31 5f 51-8d 2b a9 4a 0f c6 14 e2   .*W..1_Q.+.J....
    0010 - e0 2a e7 60 6b af 4f 12-c4 9d 3f 45 c6 b3 b1 98   .*.`k.O...?E....
    0020 - af 4c ae ad 1f af 33 6f-ba dc c8 19 5d fe 29 64   .L....3o....].)d
    0030 - d0 41 3e 6c 9d da e7 b7-df 41 08 4a ef 08 d1 d3   .A>l.....A.J....
    0040 - 65 13 86 6e 18 4d 93 7e-17 3e 45 1d fa 0d ef 11   e..n.M.~.>E.....
    0050 - 7b 01 8e d1 37 ad 8a c7-82 bd 98 34 06 22 cc 70   {...7......4.".p
    0060 - e9 ac e9 fd 06 9a 83 ed-4f 41 b3 c2 4f 8e 62 c8   ........OA..O.b.
    0070 - dc 31 a3 72 3c 67 36 a7-35 29 c9 e7 b1 cd 25 a6   .1.r<g6.5)....%.
    0080 - 5b 0c 63 54 8b 92 57 72-d9 dc d3 3b a7 e4 c4 d9   [.cT..Wr...;....
    0090 - 9e 8a bc 69 5f 92 19 67-88 21 83 c6 30 2c 22 87   ...i_..g.!..0,".
    00a0 - b3 fe 7e 8e bf 9e cb a5-e0 e6 5d 91 5c c3 cb 5d   ..~.......].\..]

    Start Time: 1511789741
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---
read:errno=104
root@odroid64:~# 
root@odroid64:~# csharp -e 'Console.WriteLine (new System.Net.WebClient().DownloadString("https://www.howsmyssl.com/").IndexOf ("1.2"))'
2393
root@odroid64:~# csharp -e 'Console.WriteLine (new System.Net.WebClient().DownloadString("https://thepiratebay.org/").IndexOf ("html"))'
System.Net.WebException: Error: SecureChannelFailure (One or more errors occurred.) ---> System.AggregateException: One or more errors occurred. ---> System.Security.Authentication.AuthenticationException: A call to SSPI failed, see inner exception. ---> Mono.Btls.MonoBtlsException: Ssl error:0f000078:elliptic curve routines:OPENSSL_internal:POINT_IS_NOT_ON_CURVE
  at /build/mono-5.4.1.6/external/boringssl/crypto/ec/ec.c:835
  at Mono.Btls.MonoBtlsContext.ProcessHandshake () [0x00038] in <50d80b08c1a5449282b22aedf03ce925>:0 
  at Mono.Net.Security.MobileAuthenticatedStream.ProcessHandshake (Mono.Net.Security.AsyncOperationStatus status) [0x0003c] in <50d80b08c1a5449282b22aedf03ce925>:0 
  at (wrapper remoting-invoke-with-check) Mono.Net.Security.MobileAuthenticatedStream:ProcessHandshake (Mono.Net.Security.AsyncOperationStatus)
  at Mono.Net.Security.AsyncHandshakeRequest.Run (Mono.Net.Security.AsyncOperationStatus status) [0x00006] in <50d80b08c1a5449282b22aedf03ce925>:0 
  at Mono.Net.Security.AsyncProtocolRequest+<ProcessOperation>d__24.MoveNext () [0x000ff] in <50d80b08c1a5449282b22aedf03ce925>:0 
--- End of stack trace from previous location where exception was thrown ---
  at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw () [0x0000c] in <62f5937022004555807e6c57c33f6684>:0 
  at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess (System.Threading.Tasks.Task task) [0x0003e] in <62f5937022004555807e6c57c33f6684>:0 
  at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification (System.Threading.Tasks.Task task) [0x00028] in <62f5937022004555807e6c57c33f6684>:0 
  at System.Runtime.CompilerServices.TaskAwaiter.ValidateEnd (System.Threading.Tasks.Task task) [0x00008] in <62f5937022004555807e6c57c33f6684>:0 
  at System.Runtime.CompilerServices.ConfiguredTaskAwaitable+ConfiguredTaskAwaiter.GetResult () [0x00000] in <62f5937022004555807e6c57c33f6684>:0 
  at Mono.Net.Security.AsyncProtocolRequest+<StartOperation>d__23.MoveNext () [0x0008b] in <50d80b08c1a5449282b22aedf03ce925>:0 
   --- End of inner exception stack trace ---
  at System.Runtime.ExceptionServices.ExceptionDispatchInfo.Throw () [0x0000c] in <62f5937022004555807e6c57c33f6684>:0 
  at Mono.Net.Security.MobileAuthenticatedStream+<ProcessAuthentication>d__47.MoveNext () [0x00254] in <50d80b08c1a5449282b22aedf03ce925>:0 
   --- End of inner exception stack trace ---
  at System.Threading.Tasks.Task.ThrowIfExceptional (System.Boolean includeTaskCanceledExceptions) [0x00011] in <62f5937022004555807e6c57c33f6684>:0 
  at System.Threading.Tasks.Task.Wait (System.Int32 millisecondsTimeout, System.Threading.CancellationToken cancellationToken) [0x00043] in <62f5937022004555807e6c57c33f6684>:0 
  at System.Threading.Tasks.Task.Wait () [0x00000] in <62f5937022004555807e6c57c33f6684>:0 
  at Mono.Net.Security.MobileAuthenticatedStream.AuthenticateAsClient (System.String targetHost, System.Security.Cryptography.X509Certificates.X509CertificateCollection clientCertificates, System.Security.Authentication.SslProtocols enabledSslProtocols, System.Boolean checkCertificateRevocation) [0x0000d] in <50d80b08c1a5449282b22aedf03ce925>:0 
  at Mono.Net.Security.MonoTlsStream.CreateStream (System.Byte[] buffer) [0x0007b] in <50d80b08c1a5449282b22aedf03ce925>:0 
  at System.Net.WebConnection.CreateStream (System.Net.HttpWebRequest request) [0x00073] in <50d80b08c1a5449282b22aedf03ce925>:0 
   --- End of inner exception stack trace ---
  at System.Net.WebClient.DownloadDataInternal (System.Uri address, System.Net.WebRequest& request) [0x00072] in <50d80b08c1a5449282b22aedf03ce925>:0 
  at System.Net.WebClient.DownloadString (System.Uri address) [0x00020] in <50d80b08c1a5449282b22aedf03ce925>:0 
  at System.Net.WebClient.DownloadString (System.String address) [0x00016] in <50d80b08c1a5449282b22aedf03ce925>:0 
  at <InteractiveExpressionClass>.Host (System.Object& $retval) [0x00005] in <71d3011ed8f44815b1d26e07e53bbb39>:0 
  at Mono.CSharp.Evaluator.Evaluate (System.String input, System.Object& result, System.Boolean& result_set) [0x00038] in <14ea19e7614849ea8d0fb20d0acca590>:0 
  at Mono.CSharpShell.Evaluate (System.String input) [0x00000] in <055e0577435d426e8b5b347a9f28e5a5>:0 
root@odroid64:~# 

@kaso17
Copy link
Collaborator

kaso17 commented Nov 30, 2017

Definitely an aarch64 specific issue, unfortunately I don't have a device to test/fix it. I suggest you open a mono issue for this.

@kaso17
Copy link
Collaborator

kaso17 commented Dec 4, 2017

For reference:
on a Synology DS218play (rtd1296 aarch64 SOC) running "DSM 6.1.4-15217 Update 2" with the same mono version it's working fine (with the same pirate bay certificate).

Mono JIT compiler version 5.4.1.6 (tarball Thu Nov 30 21:42:06 UTC 2017)
Copyright (C) 2002-2014 Novell, Inc, Xamarin Inc and Contributors. www.mono-project.com
        TLS:           __thread
        SIGSEGV:       normal
        Notifications: epoll
        Architecture:  arm64
        Disabled:      none
        Misc:          softdebug
        LLVM:          supported, not enabled.
        GC:            sgen (concurrent by default)

Here someone has the same problem on aarch64: grpc/grpc#8763

@cpaucar3
Copy link
Author

cpaucar3 commented Dec 6, 2017

Thanks, I'll check it out.

@cpaucar3
Copy link
Author

cpaucar3 commented Dec 7, 2017

I downgraded mono to the release just before the issue popped up on 10/25 and now Jackett works!

root@odroid64:~# mono --version
Mono JIT compiler version 5.4.0.201 (tarball Fri Oct 13 22:32:18 UTC 2017)
Copyright (C) 2002-2014 Novell, Inc, Xamarin Inc and Contributors. www.mono-project.com
	TLS:           __thread
	SIGSEGV:       normal
	Notifications: epoll
	Architecture:  arm64
	Disabled:      none
	Misc:          softdebug 
	LLVM:          supported, not enabled.
	GC:            sgen (concurrent by default)

And the second csharp command, this time with no errors:

root@odroid64:~# csharp -e 'Console.WriteLine (new System.Net.WebClient().DownloadString("https://thepiratebay.org/").IndexOf ("html"))'
10

Radarr works with the older mono release but Sonarr won't run, I'll just keep playing around with different releases.

Update: Sonarr works after a reinstall, thanks for pointing me in the right direction!

@cpaucar3 cpaucar3 closed this as completed Dec 7, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants