The question for us is whether such a mechanism would set bounds on multihoming sessions. What happens to TCP sessions that live longer than the IID?
A reasonable approach would be to apply the RFC 3041 way, but for
the identifiers instead of the addresses, that is an identifier
would become deprecated and not used for some outbound communication
at time T1, but packets to that identifier would be accepted until time T2 >>
T1.
I guess there is a difference between making the correlation discoverable
from a publicly available infrastructure (e.g., the DNS) and requiring
that the node, malicious or not, that wants to discover the correlation
has to communicate with the host in question.
But in any case, to be able to prove to a peer that some communcation
can fail over to use different locators, the host will need to disclose
the correlation between those locators to the peer.