Wouldn't such an additional layer always carry even more state with it?
The only advantage is that this kind of state is kept in the endpoints.
However, then we end up with the requirement that endpoints must
implement the solution, which leads to deployment problems and
management difficulties in some networks.
What I was talking about wasn't key management, but the problem that if each individual host makes its own decisions it's hard to implement traffic engineering and other policies. Rewriting the source address helps some here as this makes return traffic take a certain path, but the problem remains for destination address selection.Right, except that we have to solve key management anyway, to make any kind of security scale. Which as we know is hardly trivial.
I think that is what you should say.
I'm getting there... It's still more than a month before the draft cutoff for Vienna. :-)
I'm flattered that you assume my draft will be the one to solve this problem. (-:Lots of time to solve a problem that was discovered around 1992 :-)