I remember reading about a scheme where the process of checking a password went like this:
I can't find the original source. In any case, I don't understand
what the advantage is of using the old hash as the salt (as opposed to using a random salt),
what the advantage of this scheme is in general (further complicating rainbow table attacks?), and
if there is an advantage, how one would apply the scheme using PHPass, since the salt seems to be managed "within" PHPass...
Intuitively, I think this scheme would do nothing at best, or worsen security at worst (due to a dependency on a past value), but password security is one area where I don't trust my intuition. Please enlighten me.
EDIT:
I'm asking about re-hashing the password on each check. These similar questions do answer the first question—that using a hash as a salt is useless—but not whether it's useful to re-hash on each check:
I am no security expert, but to answer #1 there is no advantage. All it does is complicate things further.
Just use a good randomly generated salt, Like you said, PHPPass handles it internally, and PHPass is considered an extremely good tool as it has been reviewed by many security experts.