I’m posting this here because it seems to be the most relevant, and I sent an email about this to Canonical already, and haven’t heard back.
I had to change the format of the email addresses in the terminal output I included in order to get around the link limit.
I write to you to let you know that you have an issue, and potentially
a hack, on your old-releases server.
I downloaded the Ubuntu 16.04 files from here.
I was verifying the download, and had run these commands.
gpg --keyid-format long --keyserver hkp://keyserver.ubuntu.com --recv-
keys 0x46181433FBB75451 0xD94AA3F0EFE21092
gpg --list-keys --with-fingerprint 0x46181433FBB75451
0xD94AA3F0EFE21092
gpg --keyid-format long --verify SHA256SUMS.gpg SHA256SUMS
I checked the returned fingerprints from the second command to make
sure they were right, using the fingerprints given here for the
comparison.
Upon running the third command given above, I got the following output.
gpg: Signatur vom Do 28 Feb 2019 10:26:07 CST
gpg: mittels DSA-Schlüssel 46181433FBB75451
gpg: FALSCHE Signatur von “Ubuntu CD Image Automatic Signing Key
<cdimage_at_ubuntu.com>” [unbekannt]
gpg: Signatur vom Do 28 Feb 2019 10:26:07 CST
gpg: mittels RSA-Schlüssel D94AA3F0EFE21092
gpg: FALSCHE Signatur von “Ubuntu CD Image Automatic Signing Key (2012)
<cdimage_at_ubuntu.com>” [unbekannt]
Something is clearly wrong. I am building an archive of all the old
Ubuntu releases, and have thus been verifying the downloads of many
other Ubuntu releases, all downloaded from the same official Ubuntu
server. This is the first one that has failed. It seems odd that
someone would hack the server to compromise a version that old, that
almost no one is using anymore, but the failed GPG verification
suggests something is going on.