We have further investigated this ticket and would like to update you that, according to JVM securerandom algorithm, on some operating systems /dev/random waits for a certain amount of “noise” to be generated on the host machine before returning a result.
The library used for random number generation in Oracle’s JVM relies on /dev/random by default for UNIX platforms. Although /dev/random is more secure, it is recommended to use /dev/urandom if the default JVM configuration have delays. Or add devices that generate entropy for /dev/random by following steps:
- Open the $JAVA_HOME/jre/lib/security/java.security file in a text editor.
- Change the line “securerandom.source=file:/dev/random” to read: securerandom.source=file:/dev/./urandom
- Save your change and exit the text editor.
You can also set up system property “java.security.egd” which will override the securerandom.source setting.
We will also be adding this information in a readme.txt file, inside zip archive with next release.