Monetra 8.18.1 has been released and is available for upgrade. This release contains Security fixes, and it is recommended that customers using Monetra payment processing upgrade to this version as soon as possible.
Effective 8/25/2021
Monetra 8.18.1 has been released to the public and is a maintenance and security release.
This release is highly recommended for all users of Monetra and should be considered the most modern and stable release available.
Changelog
Security:
Fixes:
ThirdParty Library Updates:
____________________________
A previous version (8.18.0) was released earlier last month. Changes in this version will be included when you upgrade to version 8.18.1
Effective 8/2/2021
Monetra 8.18.0 has been released to the public and is a feature enhancement and security release.
This release is highly recommended for all users of Monetra and should be considered the most modern and stable release available.
Changelog
Database Schema: v4.14 (compatible with v4.0)
Security:
Features:
msoft_code
of NSFAUTODENY
. It has long since been a requirement that merchants in card-present environments support partial authorization responses for credit cards in order to avoid fees for being out of compliance. The guidance was that if you couldn't support partial approvals that you needed to issue a reversal if you received one. Previously Monetra required merchants pass nsf=yes
with transactions to comply with the requirements. Merchants that chose not to, might run into situations where issuers ignored the fact the merchant didn't support partial auths and send one back anyhow leading to unexpected funding for merchants. As of this change, any merchant that needs to support partial auths, if they do not pass nsf
at all, or pass nsf=no
, Monetra will send nsf=yes
to the processor, then automatically reverse the charge if partially approved and return a decline with an msoft_code
of NSFAUTODENY
to the merchant. The fail-safe logic is in place for other card types and card not present environments, where if partial auths are not expected for the given situation, an automatic reversal will occur.COMM_proxy_protocol_ports
setting in prefs.conf
to tag that port. If a connection comes in to that port without using proxy-protocol, it will be rejected as invalid. It is required to still have ports that are not behind proxy protocol for things like the Monetra Installer, so new ports should be created instead of tagging existing ports as proxy-protocol.Changes:
always_output_phard_code
in main.conf
has been added. As of Monetra 8.17.0, phard_code
will only be returned if the transaction goes online to the processor, which better matches with our documentation, however some integrations had coded to observed behavior instead of documented behavior and relied on phard_code
even when it had no meaning for the given situation. This flag reverts to the prior behavior for these types of integrations. This flag will NOT exist with Monetra v9, integrators need to fix their solutions.Integration Changes:
raw_cavv
column, containing the 3D Secure Response Code, has been added to the gut
, gl
, and gft
reportsdescloc
column, containing the Merchant Descriptor Location, has been added to the gut
, gl
, and gft
reports.msoft_code
of NSFAUTODENY
. Please see the NSF AutoDeny feature description above.enableSubmitButton
.hmac-ach-enabled
and hmac-ach-accounttype
flags.merch_flags
) named EMVODA_NONE_STANDIN_ALLOWED
which instructs UniTerm to allow Stand-In authorizations even when EMV ODA was not performed. Use with caution as it means the card could not be validated, and could be a test card.Fixes:
recurringlist
query may fail on some databases due to missing quoting in the query.recurringdel
of customer records if the database chose to rollback under certain conditions.ThirdParty Library Updates: