I know md5 alone, is strong, but still weak because of human error (short pass). So I've added a salt,
$pass = $_POST['password'];
$salt='8$&nC@bG+f_D'; //shortened
$hash=md5($pass.$salt);
Is that enough or would it be more secure if I kept my salt in an external config file above my servers public folder?
The config file is set up exactly like so;
<?php
$DATA['hostname']='localhost';
$DATA['database']='database';
$DATA['username']='***';
$DATA['password']='***';
$DATA['salt']='8$&nC@bG+f_D'; //shortened
?>
I had read somewhere that if the config file is set up as I did, the only way to obtain the data is to literally pull it off (ftp, server admin i mean) is that true or does it not matter where the config file (w/ database passwords) is stored on the server?
or md5(md5()), or, using random salts storing them on the db. I just don't want to be held liable for any password vulnerability, & don't know what's good enough,
(No private data (ie, phone numbers, ccard#'s) are held behind these passwords, just the passwords themselves I'm worried about)
Thanks