diff --git a/docs/configuration/split-ssh.md b/docs/configuration/split-ssh.md
index 247fd5d..72b9202 100644
--- a/docs/configuration/split-ssh.md
+++ b/docs/configuration/split-ssh.md
@@ -47,12 +47,12 @@ used by `ssh-agent` to ask for confirmation, for keys added using
For Fedora templates:
```
-[user@fedora-32 ~]$ sudo dnf install openssh-askpass
+ sudo dnf install openssh-askpass
```
For Debian templates:
```
-user@debian-10:~$ sudo apt-get install ssh-askpass-gnome
+sudo apt-get install ssh-askpass-gnome
```
Perform the next steps in the AppVM `vault`.
@@ -97,16 +97,16 @@ If you still want to encrypt your keys you must refer to the [Securing Your Priv
2. Make a new directory `~/.config/autostart`
- ```shell_prompt
- [user@fedora-32 ~]$ mkdir -p ~/.config/autostart
+ ```
+ mkdir -p ~/.config/autostart
```
3. Create the file `~/.config/autostart/ssh-add.desktop`
- Open the file with e.g. `gedit`
- ```shell_prompt
- [user@fedora-32 ~]$ gedit ~/.config/autostart/ssh-add.desktop
+ ```
+ gedit ~/.config/autostart/ssh-add.desktop
```
- Paste the following contents:
@@ -130,8 +130,8 @@ To control which VM is allowed as a client, which may act as the server and how
- Open the file with e.g. `nano`.
- ```shell_prompt
- [user@fedora-32 ~]$ sudo nano /etc/qubes-rpc/policy/qubes.SshAgent
+ ```
+ sudo nano /etc/qubes-rpc/policy/qubes.SshAgent
```
- If you want to explicitly allow only this connection, add the following line:
@@ -164,7 +164,7 @@ We now need to write a small script that handles connection requests from `ssh-c
- Open the file with e.g. `gedit`
```shell_prompt
- [user@fedora-32 ~]$ sudo gedit /etc/qubes-rpc/qubes.SshAgent
+ sudo gedit /etc/qubes-rpc/qubes.SshAgent
```
- Paste the following contents:
@@ -183,7 +183,7 @@ We now need to write a small script that handles connection requests from `ssh-c
2. Make it executable
```shell_prompt
-[user@fedora-32 ~]$ sudo chmod +x /etc/qubes-rpc/qubes.SshAgent
+sudo chmod +x /etc/qubes-rpc/qubes.SshAgent
```
### In the AppVM `ssh-client`
@@ -201,7 +201,7 @@ Therefore, we add a script in `rc.local` (Which will run at VM startup) to liste
- Open the file with e.g. `gedit`.
```shell_prompt
- [user@ssh-client ~]$ sudo gedit /rw/config/rc.local
+ sudo gedit /rw/config/rc.local
```
- Add the following to the bottom of the file:
@@ -223,7 +223,7 @@ Therefore, we add a script in `rc.local` (Which will run at VM startup) to liste
- Open the file with e.g. `gedit`
```shell_prompt
- [user@ssh-client ~]$ gedit ~/.bashrc
+ gedit ~/.bashrc
```
- Add the following to the bottom of the file:
@@ -353,7 +353,7 @@ If it is, restart your vault VM and do not enter your password when it asks you
2. Try fetching your identities on the SSH Client VM.
```shell_prompt
- [user@ssh-client ~]$ ssh-add -L
+ ssh-add -L
```
3. Allow operation execution. (If you don't see the below prompt, check your VM interconnection setup.)