Bitlocking Virtual Hard drives.


cereberus

Well-known member
Guru
VIP
Local time
6:16 AM
Posts
7,321
OS
Windows 11 Pro + Win11 Canary VM.
This is just an observation, not a plea for help.

I install Insider versions initially in a Hyper-V vm, and then attach vhdx to host bcd so I can natively boot vhdx file as well.

So I thought - how does bitlocker work with vhdx files.

My vms have the Hyper-V TPM enabled.

So I booted into a W11 vhdx file and encrypted C drive saving bitlocker key to a host drive.

Rebooted vm, and boots fine (no password needed as vm uses Hyper-V TPM).

I then tried to natively boot vhdx and it would not boot requiring recovery key. I am not surprised as the password is not in host pc TPM.

Equally same happened in reverse if I bitlocked C drive on vhdx m when natively host booting.

As far as I can tell it is impossible to bitlock a C drive partition so it automatically unlocks when booting from either host OS or Hyper-V.

This rather proves the TPM in Hyper-V is a full separate software TPM, not just a software passthrough to actual Host TPM.
 

My Computer

System One

  • OS
    Windows 11 Pro + Win11 Canary VM.
    Computer type
    Laptop
    Manufacturer/Model
    ASUS Zenbook 14
    CPU
    I9 13th gen i9-13900H 2.60 GHZ
    Motherboard
    Yep, Laptop has one.
    Memory
    16 GB soldered
    Graphics Card(s)
    Integrated Intel Iris XE
    Sound Card
    Realtek built in
    Monitor(s) Displays
    laptop OLED screen
    Screen Resolution
    2880x1800 touchscreen
    Hard Drives
    1 TB NVME SSD (only weakness is only one slot)
    PSU
    Internal + 65W thunderbolt USB4 charger
    Case
    Yep, got one
    Cooling
    Stella Artois (UK pint cans - 568 ml) - extra cost.
    Keyboard
    Built in UK keybd
    Mouse
    Bluetooth , wireless dongled, wired
    Internet Speed
    900 mbs (ethernet), wifi 6 typical 350-450 mb/s both up and down
    Browser
    Edge
    Antivirus
    Defender
    Other Info
    TPM 2.0, 2xUSB4 thunderbolt, 1xUsb3 (usb a), 1xUsb-c, hdmi out, 3.5 mm audio out/in combo, ASUS backlit trackpad (inc. switchable number pad)

    Macrium Reflect Home V8
    Office 365 Family (6 users each 1TB onedrive space)
    Hyper-V (a vm runs almost as fast as my older laptop)
This is just an observation, not a plea for help.

I install Insider versions initially in a Hyper-V vm, and then attach vhdx to host bcd so I can natively boot vhdx file as well.

So I thought - how does bitlocker work with vhdx files.

My vms have the Hyper-V TPM enabled.

So I booted into a W11 vhdx file and encrypted C drive saving bitlocker key to a host drive.

Rebooted vm, and boots fine (no password needed as vm uses Hyper-V TPM).

I then tried to natively boot vhdx and it would not boot requiring recovery key. I am not surprised as the password is not in host pc TPM.

Equally same happened in reverse if I bitlocked C drive on vhdx m when natively host booting.

As far as I can tell it is impossible to bitlock a C drive partition so it automatically unlocks when booting from either host OS or Hyper-V.

This rather proves the TPM in Hyper-V is a full separate software TPM, not just a software passthrough to actual Host TPM.
Just a remark on TPM in addition to your post and nothing to do with how bitlocker works or doesn't work with vhdx files etc.

You can install both on GUESTS and HOSTS the additional optional extra feature TPM diagnostics. This *might* be of some use for people wanting to explore etc what the TPM can actually do and what its capable (or not capable) of.

My own view is that this whole TPM thing based on a chip now at least 15 years old isn't the best way of ensuring security whether hardware or software based schemes. Compared to most other hardware advances e.g in video/graphics, CPU itself, SSD/NVMe technology, even boring things like routers the TPM device is positively ancient (and if Ms didn't dredge this up from somewhere for its W11 implementation I'm sure it would be long gone by now).

Even Ms on its own Forums doesn't have any sensible examples of a serious TPM use or application.

Cheers
jimbo
 

My Computer

System One

  • OS
    Windows XP,7,10,11 Linux Arch Linux
    Computer type
    PC/Desktop
    CPU
    2 X Intel i7
This rather proves the TPM in Hyper-V is a full separate software TPM, not just a software passthrough to actual Host TPM.
Thanks for mentioning this interesting find.

A separate TPM for each VM makes sense if they don't state anywhere that 'passthrough' is used.
And logical if each VM is treated as unique, you expect that each VM TPM has its own unique random generator for the creation of its own cryptographic keys.

I'm just noting this from findings, and I am in NO case an expert in crypography or TPM for that matter.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel NUC
    CPU
    i3 8109U
    Motherboard
    Intel
    Memory
    16GB DDR4 @2400
    Graphics Card(s)
    Intel Iris Plus Graphics 655
    Sound Card
    Intel / Realtek HD Audio
    Monitor(s) Displays
    LG-32ML600M
    Screen Resolution
    1920x1080
    Hard Drives
    Intel SSD 250GB + Samsung QVO SSD 1TB
    PSU
    Adapter
    Cooling
    The usual NUC airflow
    Keyboard
    Logitech Orion G610
    Mouse
    SteelSeries Rival 100 Red
    Internet Speed
    Good enough
    Browser
    Chromium, Edge, Firefox
    Antivirus
    Windows Defender
  • Operating System
    CentOS 9 Stream / Alma / Rocky / Fedora
    Computer type
    Laptop
    Manufacturer/Model
    TOSHIBA
    CPU
    Intel i7 4800MQ
    Motherboard
    TOSHIBA
    Memory
    32GB DDR3 @1600
    Graphics card(s)
    NVIDIA Quadro K2100M
    Sound Card
    Realtek HD Audio
    Monitor(s) Displays
    Built-in
    Screen Resolution
    1920x1080

Latest Support Threads

Back
Top Bottom