Updated kernels signed with the SL key have been published. Users requiring secure boot may need to perform a 'yum reinstall' after importing the SL key. http://ftp.scientificlinux.org/linux/scientific/7x/x86_64/os/sl-release-notes.html#_about_uefi_secure_boot Pat ________________________________________ From: Mailing list for Scientific Linux users worldwide [[log in to unmask]] on behalf of Pat Riehecky [[log in to unmask]] Sent: Monday, October 13, 2014 1:35 PM To: scientific-linux-users Subject: [SCIENTIFIC-LINUX-USERS] Scientific Linux 7.0 x86_64 is officially released Scientific Linux 7.0 x86_64 RELEASED - Oct 13, 2014 == Information == Fermilab's intention is to continue the development and support of Scientific Linux and refine its focus as an operating system for scientific computing. Today we are announcing the release of Scientific Linux 7. NOTE: Please review the SL Release Notes along with The Upstream Vendor's Release Notes: http://ftp.scientificlinux.org/linux/scientific/7.0/x86_64/release-notes/ https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/index.html There is a great deal of information within those documents not listed here. Send comments/issues/test reports to: [log in to unmask] == Media == You can find the release media at: http://ftp.scientificlinux.org/linux/scientific/7.0/x86_64/iso/ NOTE: The 'everything' dvd image requires a Dual-Layer (DL) compatible drive for both burning and booting off of. Alternatively the livecd-iso-to-disk utility is able to convert this to USB successfully. A USB device of sufficient size is required. Alternatively you can utilize the dd command to write the raw image to a USB device. http://ftp.scientificlinux.org/linux/scientific/7.0/x86_64/release-notes/#_how_to_make_a_bootable_usb_installer == UEFI Secure Boot == The status of UEFI Secure Boot for Scientific Linux is noted in detail at: http://ftp.scientificlinux.org/linux/scientific/7.0/x86_64/release-notes/#_about_uefi_secure_boot Booting SL7 with Secure Boot enabled works but requires a manual step. This is because the "shim" has not been signed by the UEFI CA. Instructions are included within the SL7 Release Notes. NOTE: The kernels in sl7-security have not yet been built with the SL7 Secure Boot Certificate and may not function in secure boot environments.