. Running through strace showed > that something was attempting to reading from /dev/random. Sometimes > it ran fine, but at least 25-30% it ended up blocking until the > entropy pool is refilled. To test I moved /dev/random, and created a > link from /dev/urandom to /dev/random (the former doesn't block, but > isn't cryptographically secure). It looks as if this could be related > to the loading of the SecureRandomSeedGenerator class. >
Why not use a fixed random seed for unit tests? That would make them more repeatable and avoid this problem, no?