![]() | ![]() | ![]() | ![]() |
In some UNIX environments (especially Linux and Solaris), invocation of SAS Web Application Server might be extremely slow. This behavior occurs when you use Advanced Encryption Standard (AES) or other RSA security algorithms with SAS/SECURE™ software.
The problem occurs because the AES algorithm consumes random numbers in order to perform encryption. These random numbers are read by Java from the device /dev/random. If the supply of random numbers in this device is exhausted, any attempt to read from the device blocks the Java process that is trying to read from the device. This block remains in effect until a new random number is available or until a time-out occurs.
The solution is to configure Java to use /dev/./urandom instead of /dev/random. Because the keys that SAS® uses to load metadata are not long in duration, the use of /dev/./urandom to generate random numbers is both secure and effective.
To use the /dev/urandom device:
If the device is found, the command returns results similar to the following:
Product Family | Product | System | Product Release | SAS Release | ||
Reported | Fixed* | Reported | Fixed* | |||
SAS System | SAS Web Application Server | 64-bit Enabled AIX | 9.4 | 9.45 | 9.4 TS1M0 | 9.4 TS1M6 |
64-bit Enabled Solaris | 9.4 | 9.45 | 9.4 TS1M0 | 9.4 TS1M6 | ||
HP-UX IPF | 9.4 | 9.45 | 9.4 TS1M0 | 9.4 TS1M6 | ||
Linux for x64 | 9.4 | 9.45 | 9.4 TS1M0 | 9.4 TS1M6 | ||
Solaris for x64 | 9.4 | 9.45 | 9.4 TS1M0 | 9.4 TS1M6 |