Start a Conversation

Unsolved

This post is more than 5 years old

AW

4644

May 5th, 2017 09:00

Dell Precision 5510 with TB16 Dock Prompts for Recovery Key on BitLocker Enabled Windows 10 1703

Title in the subject line pretty much says it.
I've got a Dell Precision 5510 and a TB16 dock.
It is currently running Windows 10 1703 but this issue existed under Windows 10 1607 as well.

Sequence of events/how to replicate:

  • Connect the Precision 5510 to the TB16 dock (presence of any other combination of peripherals seems to be irrelevant)
  • Boot into Windows 10 and enable BitLocker using TPM and a PIN
  • Shutdown and power on or /restart, whilst still connected to the TB16, enter your PIN and boot successfully
  • Shutdown and disconnect from the TB16 dock then try to boot - BitLocker prompts for the great big recovery key (what a pain)
  • Entering the recovery key and proceeding to boot is fine, as is shutting down and trying to boot again with the TB16 attached but if you're away from the office (and the TB16) and don't have the recovery key, then you're in a bit of a pickle!

If you've...

  • Booted with the TB16 attached
  • Shutdown and disconnected from the TB16
  • Booted to encounter BitLocker recovery (but luckily had the recovery key with you and entered it)
  • Continued to use the Precision 5510 away from the TB16 and restarted
    ...then you have no need to encounter BitLocker recovery and re-enter the recovery key again

One you go back to connecting to the TB16 though... you guessed it, you need to re-enter the recovery key again.

I see two ways to look at this:

  1. What's going on at a hardware level that is resulting in this behaviour? Is there something at a dock configuration, firmware or BIOS level that can be done to avoid this happening?
  2. What can be done with BitLocker to make it tolerate the change(s) in hardware state when connecting and disconnecting the TB16?

Question 2 is probably best answered elsewhere but has anybody else encountered this situation or can anybody from Dell suggest answers to Question 1? Is there anything I can do differently with Precision 5510 and TB16?

10 Posts

May 19th, 2017 05:00

Can anybody from Dell or elsewhere offer any advice on this?

10 Posts

May 30th, 2017 03:00

Is there somewhere I can get this escalated to get a response from Dell?

10 Posts

November 16th, 2017 02:00

I've recently updated to Windows 10 1709 and this issue still exists.

This is just one of the ways that the TB16 dock has caused headaches and disrupted my working day. Not Happy!

4 Operator

 • 

754 Posts

November 16th, 2017 06:00

Hi Alex,

Sorry to hear of your issues. Please try updating the BIOS, there are a couple of Bitlocker recovery fixes included:

www.dell.com/.../driversdetails

Let us know how you get on.

3 Apprentice

 • 

4.3K Posts

November 16th, 2017 06:00

I don't work for Dell but the only two reasons I might think the Dock would be involved is if you have a drive on the dock it needed to access or the Ethernet network connection.  You might try disconnecting the Ethernet from the Dock and verifying whether you are on a Public or Private network.

I don't use BitLocker but my system likes to encrypt my OS partition when I reset my install or do a clean install.  My BCD store contains the entry below, in the bootmgr section, which my other systems do not.

fverecoveryurl          windows.microsoft.com/recoverykey

Is there more than one key for your system on the website?  It may point you to a OneDrive.live site.

And lastly, I would try setting up BitLocker without being connected to the Dock.

4 Operator

 • 

14K Posts

November 16th, 2017 09:00

You have to disable Thunderbolt boot support in the BIOS. This behavior has nothing to do with Windows and only partly to do with BitLocker; it's mostly the TPM.  It's occurring because when BitLocker uses a TPM, it stores the key as a special type of key that requires a "platform integrity check" to be released. Basically, before the TPM releases the decryption key at boot, it checks the hardware environment to ensure that nothing has changed that might compromise the security of the hardware platform. Thunderbolt operates over PCIe, and changes in the PCIe devices connected to the system can change the overall security of the system.  This means that when Thunderbolt boot support is enabled, every time the connected/disconnected state of the dock changes compared to the hardware profile that the TPM has been told to trust, it refuses to release the decryption key and prompts for the Recovery Key instead. When the Recovery Key is entered, the TPM “re-seals” to the current hardware profile, but then it no longer trusts the previous profile. This is all why Thunderbolt boot support is DISABLED by default in the BIOS.

Note that if you make this change while your TPM trusts the "dock connected" hardware profile, you will see the Recovery Key prompt one more time, after which you'll be fine since the dock will always appear disconnected at boot time from that point on, even when it actually is connected.

Incidentally, you may have noticed that updating your BIOS triggers a Recovery Key prompt, and that occurs for the same reason.  A change in BIOS revision is a potential security-affecting change, because the system might have been downgraded or even upgraded to a specific release that contains a known security exploit.

4 Operator

 • 

14K Posts

November 16th, 2017 09:00

Just as a follow-up to the above suggested solution, if disabling boot support isn’t acceptable, then you would have to use password-based BitLocker rather than TPM-based. That’s disabled by default because it lacks the platform integrity check functionality I described above (and you also can’t perform an unattended remote reboot anymore), but it can be enabled in Group Policy Editor. It’s also only intended for systems that lack a TPM, so you might have to actually disable the TPM in the BIOS to block BitLocker from using it (haven’t tried this scenario myself), but that would avoid the behavior you’re seeing, at the cost of reduced security and convenience.

2 Posts

November 22nd, 2017 09:00

You can use Group Policy to adjust the which PCR values are checked in the platform validation profile.

Found under Computer Configuration/Administrative Templates/Windows Components/BitLocker Drive Encryption/Operating System Drives > Configure TPM platform validation profile (there can some variations of this name to cover different Windows versions, UEFI, etc. depending on what level of OS you are using).

You can set to just check PCR 11 as the base.  If you've got the time, you can enable others (some of the GP notes will tell you the defaults) to see what gives you enhanced protection while not triggering the need to the recovery key unnecessarily.

And yes, I have done this because I was encountering a similar situation with Latitude 7480 laptops and TB16 docks.  This allows you to continue to use the TPM as one of the authentication factors for BitLocker.

4 Operator

 • 

14K Posts

November 22nd, 2017 10:00

I knew about that, but I specifically didn't suggest it because weakening the platform integrity check significantly reduces security.  Typically Thunderbolt Boot Support is enabled just to get a laptop imaged when it lacks a built-in NIC (an increasingly common problem for enterprises these days), but after that's done, how often do you need to boot from a device connected via the Thunderbolt dock?  That's why I suggested simply disabling that option after imaging, thereby maintaining the security of the platform integrity check.

No Events found!

Top