The advantages of not having identifiers are that it's easier to be backward compatible and less new stuff to worry about.
This is a terminology nit, but I think all approaches to multihoming
support have some identifier - whether it is a FQDN, or a list of locators.
What is interesting is whether there is a new ID name space, as you said in
the first paragraph,
and whether those IDs are visible to the applications.
Taking NOID as an example of with no new ID namespace, the amount of work (in the form of DNS lookups in forward and reverse maps) will also result in stronger association between FQDNs and locators than we have today.
So I think it is inevitable that providing "do no harm" security for the multihoming will accidentally improve security a bit in some cases.
I've certainly entertained ideas that are a lot weaker than NOID, for instance just have the peers exchange their sets of locators plus a cleartext cookie/context tag when the setup the state, and then do a RR check before sending packets to a new locator, but I've received pushback from folks that I wouldn't characterize as security geeks, that this would be too weak.
But perhaps it is time to writeup something like that and subject it to wider scruteny, combined with your suggestion below.
I've been trying to layer things so that IPsec and TLS benefit from
the multihoming support by sitting above the layer that handles the
multiple locators, and HIP essentially is layered in the same place.
So perhaps one should explore, taking into account IKEv2 and MOBIKE work,
an approach which layers the multihoming support above IPsec when IPsec
is used?
Thus something which is quite insecure (weaker than NOID as above) when
IPsec isn't used, but when IPsec is used it is as strong as with IPsec in
today's Internet.
Is anybody interested in exploring these ideas further?