TPM chip - clearing without knowing the BIOS pw

Hi experts.

Read the description carefully: we have a Dell laptop with the bios setup being locked. We found that out while trying to clear the TPM chip of the device using TPM.msc under windows. Windows told us to reboot but upon rebooting, it at once asked us to enter the bios pw in order to complete the process...which we don't have anymore.

So we talked to Dell and they said they can send us a master password if we show them the invoice together with the system serial and passport copy, which we did. We received the master password but in order to use it, we would need to enter the bios - which we can't because of the attempt to clear the TPM! A vicious circle.
Again: the master password can only be used to reset the real password, but we cannot get to the stage where the reset can be initiated because that damn TPM asks for the bios password, blocking all access to the bios!

Question, finally: is it possible to undo initiation of the TPM clearance? In other words: what happens when we choose to clear the tpm, where is that request saved to - directly to the TPM?

We have phoned Dell and they understand the situation but have no further advice because they don't know what is triggering that pw prompt. They are trying to help and contact internal experts, but that might take time, that's why I ask here in the meanwhile.
LVL 59
McKnifeAsked:
Who is Participating?

Improve company productivity with a Business Account.Sign Up

x
 
btanConnect With a Mentor Exec ConsultantCommented:
I dont think we can revert back once the TPM is cleared (as compared to turning on or off) and rebooted. the original keys used to deployed to the machine is lost and in the unowned state, back to factory reset state.
The clearing is stated as a reset removing the owner authorization value and any keys stored in the TPM, I doubt it is any key in the HDD
https://technet.microsoft.com/en-us/library/jj603122.aspx

also separately, I did a quick check on Intel TPM paper and see related activities as we clear the TPM. It seems like we are in the step 3 already
A TPM administrative sequence invoked from the operating system proceeds as follows:
1. User makes a TPM administrative request through the operating system’s security
software.
2. The operating system requests the BIOS to execute the TPM administrative
command through TPM ACPI methods and then resets the system.
3. The BIOS verifies the physical presence and confirms the command with the
operator.
4. The BIOS executes TPM administrative command(s), inhibits BIOS Setup entry
and boots directly to the operating system which requested the TPM command(s).
http://download.intel.com/support/motherboards/server/sb/g21682003_tpm_hwug.pdf
0
 
☠ MASQ ☠Connect With a Mentor Commented:
Just a comment, will follow this one with interest so please post the outcome.
Suspect Dell will RMA the board.  Removing TPM with an active BIOS admin password will have broken the Trust relationship in the Core Root of Trust for Measurement (CRTM) on the TPM BIOS.  If anything here the fault is with Dell not having a master reset that can be applied at the password entry screen you have reached.  My very unhelpful comment is you should always disable the BIOS admin password before TPM, even if you have to go via Dell to do this. What you've ended up with from the Trusted Platform perspective is a laptop where there's been a brute force attempt to break TPM, the assumption by the CRTM is that you will now be able to prove ownership with the BIOS password otherwise you are locked out for good :(

Hoping I'm not right!
0
 
btanExec ConsultantCommented:
This is quite similar to your query and password are of various
- bios password :  System password (prompted before the system can boot up) and Admin password (prompted when trying to access the BIOS settings) which is stored in chip
- tpm password : TPM security password, and protected crypto keys stored in HDD, which they are all used for the subsequent decryption of the TPM protection enabled HDD.
http://www.experts-exchange.com/Hardware/Components/Q_27022103.html

This is useful (see "Clearing Forgotten Passwords" which it claimed the process erases both the system and administrator passwords, we must be careful on this as it may backfire since touching the jumper ...) http://phubner.eng.ua.edu/Files/Optiplex%20745/advfeat.htm#wp1147926

There are posting on unlocking service online but I do see only as last last resort
http://www.biospro.com/ (BIOS) or http://hdd-tools.com/products/rrs/ (Repair Station for HDD ATA password, and note this is not TPM password (like the dell security suite) and is also for specific model)
0
Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

 
btanExec ConsultantCommented:
Side note caution too - Clearing the TPM resets it to an unowned state and highly likely leading to data loss for the data encrypted w/o backup or recovery. The overall effect is the TPM will be off, and resets back to factory defaults. Hence losing all created keys and data that is protected by those keys.
0
 
McKnifeAuthor Commented:
Masq, I fully agree. btan, I am looking for a way to undo that request, that's all. The problem itself has been solved by disassembling that laptop and removing the battery, by the way.

Question was: is it possible to undo initiation of the TPM clearance? In other words: what happens when we choose to clear the tpm, where is that request saved to - directly to the TPM?
This was just born out of interest, I knew that with that laptop model, removing the battery would help.
0
 
McKnifeAuthor Commented:
You still get me wrong. I am NOT trying to do something AFTER the tpm is cleared, but before.
I am trying to undo the initialization of the clearing process which effectively blocked the BIOS, as I described.
0
 
☠ MASQ ☠Commented:
"I knew that with that laptop model, removing the battery would help."
Now I feel cheated :)  I was sure you'd be dealing with a NVRAM BIOS or you wouldn't have asked!

Yes Btan is right, there are two levels of ID on the TPM, one that's tied to the hardware which should be inviolate and prevents attempts at replacing the chip and the non-volatile EPROM  which is keyed into the OS and reset when ownership is established.  By force clearing the second of these the TPM no longer recognises ownership.  This in turn messes up the BIOS CRTM startup and because TPM-based drive encryption is now disabled anything using it becomes inaccessible.


If you have the rights to use TPM.msc the assumption is you know that this is the consequence of your action which is why you can do this via the OS.  When you send the intitialise clear TPM instruction the chip is set to wipe the ownership key on reboot.  Although there should in theory be a point before the restart that you could reverse/cancel your instruction I have never heard of a way to do this.  Once the machine restarts it's too late.
0
 
btanExec ConsultantCommented:
I think likewise with MASQ too.
I know that you are trying to revert back hence as already stated once restarted and BIOS prompted, it would already halt at step 3 waiting for the BIOS password. There is no way out to revert that process. I dont think there is really any more way out, and not to say undo as the phase is already registered to await confirmation and proceed with TPM clear.
0
 
McKnifeAuthor Commented:
After I disconnected the battery, the BIOS was accessible and there was no request pending to clear the TPM. So the answer must be that this request is saved to the BIOS, not to the TPM itself.
I was just trying to avoid the disassembly of the machine since with that model, it's really a long process. I first hoped it got saved to the BIOS and tried to flash it, but the flash program didn't let me because it was the newest already and it didn't accept older ones.
So I learned where the request gets saved to, case closed. btan' list from intel's paper seemed to indicate the same.

Thanks
0
 
btanExec ConsultantCommented:
thanks for sharing
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.