Monetra 8.18.1 has been released and is available for upgrade. This release contains Security fixes, and it is recommended that customers using Monetra payment processing upgrade to this version as soon as possible.
Effective 8/25/2021
Monetra 8.18.1 has been released to the public and is a maintenance and security release.
This release is highly recommended for all users of Monetra and should be considered the most modern and stable release available.
Changelog
Security:
Fixes:
ThirdParty Library Updates:
____________________________
A previous version (8.18.0) was released earlier last month. Changes in this version will be included when you upgrade to version 8.18.1
Effective 8/2/2021
Monetra 8.18.0 has been released to the public and is a feature enhancement and security release.
This release is highly recommended for all users of Monetra and should be considered the most modern and stable release available.
Changelog
Database Schema: v4.14 (compatible with v4.0)
Security:
Features:
msoft_code of NSFAUTODENY. It has long since been a requirement that merchants in card-present environments support partial authorization responses for credit cards in order to avoid fees for being out of compliance. The guidance was that if you couldn't support partial approvals that you needed to issue a reversal if you received one. Previously Monetra required merchants pass nsf=yes with transactions to comply with the requirements. Merchants that chose not to, might run into situations where issuers ignored the fact the merchant didn't support partial auths and send one back anyhow leading to unexpected funding for merchants. As of this change, any merchant that needs to support partial auths, if they do not pass nsf at all, or pass nsf=no, Monetra will send nsf=yes to the processor, then automatically reverse the charge if partially approved and return a decline with an msoft_code of NSFAUTODENY to the merchant. The fail-safe logic is in place for other card types and card not present environments, where if partial auths are not expected for the given situation, an automatic reversal will occur.COMM_proxy_protocol_ports setting in prefs.conf to tag that port. If a connection comes in to that port without using proxy-protocol, it will be rejected as invalid. It is required to still have ports that are not behind proxy protocol for things like the Monetra Installer, so new ports should be created instead of tagging existing ports as proxy-protocol.Changes:
always_output_phard_code in main.conf has been added. As of Monetra 8.17.0, phard_code will only be returned if the transaction goes online to the processor, which better matches with our documentation, however some integrations had coded to observed behavior instead of documented behavior and relied on phard_code even when it had no meaning for the given situation. This flag reverts to the prior behavior for these types of integrations. This flag will NOT exist with Monetra v9, integrators need to fix their solutions.Integration Changes:
raw_cavv column, containing the 3D Secure Response Code, has been added to the gut, gl, and gft reportsdescloc column, containing the Merchant Descriptor Location, has been added to the gut, gl, and gft reports.msoft_code of NSFAUTODENY. Please see the NSF AutoDeny feature description above.enableSubmitButton.hmac-ach-enabled and hmac-ach-accounttype flags.merch_flags) named EMVODA_NONE_STANDIN_ALLOWED which instructs UniTerm to allow Stand-In authorizations even when EMV ODA was not performed. Use with caution as it means the card could not be validated, and could be a test card.Fixes:
recurringlist query may fail on some databases due to missing quoting in the query.recurringdel of customer records if the database chose to rollback under certain conditions.ThirdParty Library Updates: