No, I'm just saying if my password was q3y7b9o6 (which it is not, obviously), is that unacceptably weak? The brute force calculators, noting that there are no capitals or non alphanumeric symbols, and assuming half a million PCs are trying to crack it, would say that is too weak.
Sorry for the delay in responding. I got to playing in other subforums for a while.
To answer your question, I have to hearken back to a previous post: It depends on what's being protected. I would definitely say that's definitely weak for, say, a credit card or other financial site that could cause some serious harm to you. If a malicious intruder knew he had the password for such a resource, he might be more willing to risk his botnet's detection by harnessing it for that password, as opposed to using that net to crack someone's
Sports Illustrated login.
Using that
spreadsheet I linked earlier, I used these assumptions to generate an answer for you:
- An average botted host being able to test 1 million keys per second. A mere 200 Mhz Pentium is able to achieve that rate if that were all it were doing, but it's safe to say that no malicious coder in his right mind would suck up 100% or even 50% of total CPU resources on his "borrowed" (i.e. compromised and "botted") computers. This figure is arguable, but I think it's reasonable. More pessimistic figures can be used if someone prefers.
- 45,000 botted hosts being harnessed for a calculation. That figure derives from here, and it's based on a pre-2006 study by a PhD student. I have no reason to believe that the figure has grown since then, especially with the added emphasis on virus scanners and the added vigilance of many ISPs since that year, but I don't know if it's shrunk either. So like the first presumption, it's arguable.
- A character set of 36 possible characters available for the password. That's your figure; it derives from you saying lowercase and numbers, but no capitals or non-alphanumeric characters.
With those assumptions: An 8 character password is cracked so fast, it doesn't even register as a fraction of a single day. A 12 character password takes just under two weeks (12 days), and a 13 charcter one takes just over a year 439 days). It takes 14 characters to reach a level where a cracking starts to look like it's becoming difficult enough to where there has to be a damn,
damn good reason to work on it (15,795 days; that's just over 43 years). 15 characters is where you reach the point of practical impossibility (over 1,000 years).
And as I've been saying, there are a ton of assumptions built into that figure. It presumes a brute force attempt to crack it. It presumes that the computers have to iterate through all the possibilities. It presumes that the botnet can work together efficiently and well (and doesn't get diminished by users discovering their botted and cleaning out their computers)... and so on and so forth. There are many other legitimate assumptions that can be applied and would change the above figures. It's reasonable to say that the above figures are not the final word, not by a long shot. But my point ultimately is that an 8 character-long, lower case and numbers only password is not really considered strong using even just middling assumptions about what's used to crack it. It's not a password I would use to protect my bank account or credit card site logins. But for, say, just logging into JREF

? Doesn't really matter, does it?
Does that answer your question? Sorry it's so long, but I felt the need to lay out my reasoning.