This document is well written and very readable. Nits ---- Section 5.3: The first paragraph appears to be repeated. It appears at the end of page 11 and also at the start of page 12. Section 5.4 first paragraph: OLD --> "This information is incorporated to a list of NSFs under its control" Suggest --> This information is incorporated in a list of NSFs under its control" Section 8: Security Considerations: OLD --> In particular, the I2NSF Controller will handle cryptographic material so that the attacker may try to access this information. Although we can assume this attack will not likely to happen due to the assumed security measurements to protect the I2NSF Controller, it deserves some analysis in the hypothetical case the attack occurs. Suggest --> In particular, the I2NSF Controller will handle cryptographic material thus the attacker may try to access this information. Although we can assume this attack is not likely to happen due to the assumed security measurements to protect the I2NSF Controller, it still deserves some analysis in the hypothetical case that the attack occurs. Section 8.1 last bullet OLD --> If certificates are used, the NSF MAY generate the private key and exports the public key for certification to the I2NSF Controller. How the NSF generates these cryptographic material (public key/ private keys) and exports the public key it is out of scope of this document. Suggest --> If certificates are used, the NSF MAY generate the private key and export the public key for certification to the I2NSF Controller. How the NSF generates these cryptographic material (public key/ private keys) and exports the public key, is out of scope of this document.