Provisioners can alter the configuration of the machines they are attached to via the configure method. This may be the perfect place to attach private network definitions. Also, provisioners have a destroy method that gets run when a machine is deleted.
If a provisioner-based implementation works, it may allow us to shed a lot of hackery and custom code.