Bitlocking Virtual Hard drives.


cereberus

Well-known member
Guru
VIP
Local time
5:57 PM
Posts
5,715
OS
Windows 10 Pro + others in VHDs
This is just an observation, not a plea for help.

I install Insider versions initially in a Hyper-V vm, and then attach vhdx to host bcd so I can natively boot vhdx file as well.

So I thought - how does bitlocker work with vhdx files.

My vms have the Hyper-V TPM enabled.

So I booted into a W11 vhdx file and encrypted C drive saving bitlocker key to a host drive.

Rebooted vm, and boots fine (no password needed as vm uses Hyper-V TPM).

I then tried to natively boot vhdx and it would not boot requiring recovery key. I am not surprised as the password is not in host pc TPM.

Equally same happened in reverse if I bitlocked C drive on vhdx m when natively host booting.

As far as I can tell it is impossible to bitlock a C drive partition so it automatically unlocks when booting from either host OS or Hyper-V.

This rather proves the TPM in Hyper-V is a full separate software TPM, not just a software passthrough to actual Host TPM.
 

My Computer

System One

  • OS
    Windows 10 Pro + others in VHDs
    Computer type
    Laptop
    Manufacturer/Model
    ASUS Vivobook 14
    CPU
    I7
    Motherboard
    Yep, Laptop has one.
    Memory
    16 GB
    Graphics Card(s)
    Integrated Intel Iris XE
    Sound Card
    Realtek built in
    Monitor(s) Displays
    N/A
    Screen Resolution
    1920x1080
    Hard Drives
    1 TB Optane NVME SSD, 1 TB NVME SSD
    PSU
    Yep, got one
    Case
    Yep, got one
    Cooling
    Stella Artois
    Keyboard
    Built in
    Mouse
    Bluetooth , wired
    Internet Speed
    72 Mb/s :-(
    Browser
    Edge mostly
    Antivirus
    Defender
    Other Info
    TPM 2.0
This is just an observation, not a plea for help.

I install Insider versions initially in a Hyper-V vm, and then attach vhdx to host bcd so I can natively boot vhdx file as well.

So I thought - how does bitlocker work with vhdx files.

My vms have the Hyper-V TPM enabled.

So I booted into a W11 vhdx file and encrypted C drive saving bitlocker key to a host drive.

Rebooted vm, and boots fine (no password needed as vm uses Hyper-V TPM).

I then tried to natively boot vhdx and it would not boot requiring recovery key. I am not surprised as the password is not in host pc TPM.

Equally same happened in reverse if I bitlocked C drive on vhdx m when natively host booting.

As far as I can tell it is impossible to bitlock a C drive partition so it automatically unlocks when booting from either host OS or Hyper-V.

This rather proves the TPM in Hyper-V is a full separate software TPM, not just a software passthrough to actual Host TPM.
Just a remark on TPM in addition to your post and nothing to do with how bitlocker works or doesn't work with vhdx files etc.

You can install both on GUESTS and HOSTS the additional optional extra feature TPM diagnostics. This *might* be of some use for people wanting to explore etc what the TPM can actually do and what its capable (or not capable) of.

My own view is that this whole TPM thing based on a chip now at least 15 years old isn't the best way of ensuring security whether hardware or software based schemes. Compared to most other hardware advances e.g in video/graphics, CPU itself, SSD/NVMe technology, even boring things like routers the TPM device is positively ancient (and if Ms didn't dredge this up from somewhere for its W11 implementation I'm sure it would be long gone by now).

Even Ms on its own Forums doesn't have any sensible examples of a serious TPM use or application.

Cheers
jimbo
 

My Computer

System One

  • OS
    Windows XP,7,10,11 Linux Arch Linux
    Computer type
    PC/Desktop
    CPU
    2 X Intel i7
This rather proves the TPM in Hyper-V is a full separate software TPM, not just a software passthrough to actual Host TPM.
Thanks for mentioning this interesting find.

A separate TPM for each VM makes sense if they don't state anywhere that 'passthrough' is used.
And logical if each VM is treated as unique, you expect that each VM TPM has its own unique random generator for the creation of its own cryptographic keys.

I'm just noting this from findings, and I am in NO case an expert in crypography or TPM for that matter.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel NUC
    CPU
    i3 8109U
    Motherboard
    Intel
    Memory
    16GB DDR4 @2400
    Graphics Card(s)
    Intel Iris Plus Graphics 655
    Sound Card
    Intel / Realtek HD Audio
    Monitor(s) Displays
    LG-32ML600M
    Screen Resolution
    1920x1080
    Hard Drives
    Intel SSD 250GB + Samsung QVO SSD 1TB
    PSU
    Adapter
    Cooling
    The usual NUC airflow
    Keyboard
    Logitech Orion G610
    Mouse
    SteelSeries Rival 100 Red
    Internet Speed
    Good enough
    Browser
    Chromium, Edge, Firefox
    Antivirus
    Windows Defender
  • Operating System
    CentOS 9 Stream / Alma / Rocky / Fedora
    Computer type
    Laptop
    Manufacturer/Model
    TOSHIBA
    CPU
    Intel i7 4800MQ
    Motherboard
    TOSHIBA
    Memory
    32GB DDR3 @1600
    Graphics card(s)
    NVIDIA Quadro K2100M
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Built-in
    Screen Resolution
    1920x1080

Latest Support Threads

Back
Top Bottom