It's not that keeping the salt seperate would be so hard, it's that it wouldn't buy you anything. A modern OS will protect the password hashes+salts together, so that even if a cracker gets the list of users, they've got nothing to work on.
There might, however, be an exception to this principle -- two machines connected by a physical link or over a network using one of the secure protocols (ssh/https). In this scenario, you could, for instance, hash the password on one machine, hash the salt on the other, and then hash some form of the two together to gain access to the target machine... kind of a bizarre setup, but it just might work.
In this situation, you acutally could keep your salts in one place and your keys in another. The two machines would have to be able to talk to each other in a trusted way (no man-in-the-middle attacks), but you're essentially requiring the cracker to gain access to two machines in order to understand what's going on.
Of course, on the flip side you introduce new points of failure... especially over an insecure network.
Just a thought, and I profess only the most basic knowledge of cryptography.