Yes. A single TPM can store several independent blobs, so Windows can keep its BitLocker key there while Ubuntu stores a LUKS-unlock key of its own.
Why does the Ubuntu installer say “TPM is in DA lock-out mode”?
“DA” = Dictionary-Attack. Too many bad authorization attempts (often from previous experiments) have temporarily locked the TPM. The firmware can’t write new keys until the lock clears.
Most boards clear the lock after a power-cycle or a set time (e.g. 24 hours).
If it stays locked you’ll need to Clear / Reset the TPM from the firmware setup.
Will clearing the TPM erase my BitLocker key
It wipes the sealed copy inside the TPM, not your data.
Boot Windows once with the BitLocker recovery key, then BitLocker will reseal a fresh copy of its key into the new TPM. So:
Back up your 48-digit BitLocker recovery key first!
Clear / reset the TPM in UEFI Setup (or tpm.msc > Clear TPM).
Boot Windows - it asks for the recovery key once - BitLocker resumes - key is resealed automatically.
No files are lost.
From your existing Ubuntu you can bind the LUKS volume to the TPM in one command:
sudo systemd-cryptenroll /dev/nvme0n1pX --tpm2
(replace /dev/nvme0n1pX with your LUKS partition)
That stores a random unlock key in the TPM and adds a new tpm2 entry to your LUKS header. Then edit /etc/crypttab so the volume is unlocked via TPM at boot.
Tips for a smooth dual-boot setup
Keep Secure Boot either on for both OSes or off for both.
Different Secure-Boot states change PCR 7, and a mismatched PCR will block TPM-based unlock.
When enrolling with systemd-cryptenroll, you can restrict the PCR set:
--tpm2-pcrs=0+2 # common choice that works for both Windows and Linux boots
Always keep an emergency LUKS passphrase (and your BitLocker recovery key) somewhere safe in case firmware updates or PCR changes lock you out.
Bottom line
Make sure you have the BitLocker recovery key.
Clear the TPM (this removes the DA lockout).
Boot Windows once with the recovery key so BitLocker reseals.
From Ubuntu, use systemd-cryptenroll … --tpm2 to add a TPM-unlock entry to your LUKS disk no reinstall needed. Happy dual-booting!
The (still experimental) TPM mode in the installer is actually inherited from our UbuntuCore IoT system which is not designed for any dual boot setups (IoT or industrial devices usually come with a single OS only and have no need for dual booting), so it is still rather weak on that side (this is supposed to become better with the next LTS) …
If you actually want TPM supported disk encryption will have to do it following some manual HOWTO like @thingizkhan described above (or following some other tutorial, I guess there are several out there) or simply resort to the manual way by typing in an encryption password without TPM.
I find guides which use dracut - but according to my reading, latest ubuntu use initramfs - so when running the update command after editing I get the warning that the tpm2 options are unknown.
You will find that the systemd-cryptsetup in Ubuntu is simply not compiled with TPM2 support turned on …
I would assume this is because systemd is not used at all in Ubuntus initrd yet … this is about to change on the way to 26.04 LTS when the distro will switch to systemd based initramfs and dracut …
Though I’m still not sure it will be turned on at all since as you can see in the bug you linked handling of unsealed initramfses is considered insecure (to quote the marvelous steve langasek it is a “security theater”), see the comment number 19 in the bug, that explains the concerns pretty well:
@ogra many thanks for your time and detailed explanation. Based on your information I will wait until 26.04 is released and see if it works by then It’s not really a killer feature, would have been a nice to have
Also thanks for the linked comment. So it makes for sure to wait for a proper implementation in the release instead of trying to patch & hack the system to make it maybe less secure