The salt is intended to deter pre-computed dictionary attacks. However, as mentioned in this security review, the salt does not really provide any additional security because the salt is publicly available through the NSEC3PARAMS
record. Since the fully-qualified name is used in NSEC3 hashes, there is not even really a risk of a globally useful rainbow table-type attack, so you're free to choose your hash arbitrarily.
Should an attacker make an unlikely NSEC3 hash collision, the salt would have to be changed to eliminate the collision.
EDIT: For what it's worth, RFC 5155 does make a recommendation:
The salt SHOULD be at least 64 bits long and unpredictable, so that
an attacker cannot anticipate the value of the salt and compute the
next set of dictionaries before the zone is published.