Notice: SFTP Infrastructure Update

Starting from Wednesday, May 8, 2024, we will be updating the servers hosting our SFTP services used for data exchange.

The servers involved are:

  • ftp-clab.housing.tomato.it
  • ftp-clab2.housing.tomato.it
  • ftp-clab3.housing.tomato.it

Temporary connectivity interruptions may occur due to the change of IP addresses of the underlying servers.

Following the change of IP addresses, if you encounter a warning message such as “Warning: remote host identification has changed,” it can be safely ignored as it does not imply any security issues.

In case of further problems or difficulties, please contact customer service at helpdesk@contactlab.com.

Read more

SmartRelay connection security protocols update

 

 

Maintenance

After the intervention to strengthen the sending infrastructure, the level of connection security to the SmartRelay was increased.
In case of using TLS protocols for communication encryption, a strongly recommended practice, we ask you to verify the correct functioning of sending communications, remembering that at the moment the supported and updated ciphers are the following:

TLSv1.2:
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) – A
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) – A
TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) – A
TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) – A
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) – A
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) – A
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) – A
TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) – A
TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) – A
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) – A
TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) – A
TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) – A
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) – A
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) – A
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) – A
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) – A
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) – A
TLS_DH_anon_WITH_AES_128_CBC_SHA (dh 2048) – F
TLS_DH_anon_WITH_AES_128_CBC_SHA256 (dh 2048) – F
TLS_DH_anon_WITH_AES_128_GCM_SHA256 (dh 2048) – F
TLS_DH_anon_WITH_AES_256_CBC_SHA (dh 2048) – F
TLS_DH_anon_WITH_AES_256_CBC_SHA256 (dh 2048) – F
TLS_DH_anon_WITH_AES_256_GCM_SHA384 (dh 2048) – F
TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA (dh 2048) – F
TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) – F
TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA (dh 2048) – F
TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) – F
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) – A
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) – A
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) – A
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) – A
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) – A
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) – A
TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) – A
TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) – A
TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) – A
TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) – A
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) – A
TLS_ECDH_anon_WITH_AES_128_CBC_SHA (secp256r1) – F
TLS_ECDH_anon_WITH_AES_256_CBC_SHA (secp256r1) – F
TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) – A
TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) – A
TLS_RSA_WITH_AES_128_CCM (rsa 2048) – A
TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) – A
TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) – A
TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) – A
TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) – A
TLS_RSA_WITH_AES_256_CCM (rsa 2048) – A
TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) – A
TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) – A
TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) – A
TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) – A
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) – A
TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) – A
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) – A
TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) – A

TLSv1.3:
TLS_AKE_WITH_AES_128_CCM_SHA256 (ecdh_x25519) – A
TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) – A
TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) – A
TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) – A

If the ciphers used are not part of the previous list, the service may return communication errors and not work correctly.

We therefore invite you to update your applications so as to be aligned with the new security standards.

If shipping problems are encountered despite the TLS/cipher update, we suggest disabling any peer checks and/or contacting us to update the hostname of your Listener if the SmartRelay setup is several years old.

 

 

Read more

Discontinuation of TAF (Tell a Friend) functionality, November 1st , 2023

Maintenance

 

The TAF (Tell a Friend) functionality on Send and MailUp CDP will be discontinued as of 01 November 2023.

Please remove the related Placeholder (${taf_url}$) from your email templates.

However, from the date of discontinuation, the presence of the Placeholder will not cause any disruption, although it will be reported for information purposes during the delivery creation process.

Attempts to use TAF by recipients, on emails received that may still contain the corresponding link, will be redirected to a page informing them of the discontinuation.

For further information, please contact the Customer Care

 

 

Read more

Maintenance alert: October, 10th, 2023

 

Maintenance

 

On Tuesday October, 10th, 2023, a maintenance activity is planned for the optimization of the sending infrastructure from 06:00 am to 07:00 am CEST.

During this period it will not be possible to send emails.

We suggest not planning deliveries in this time window and autonomously change the time of those already planned, before the start of maintenance.Scheduled deliveries will be managed when services restart, the sending service via API and Smart Relay will not be available in the indicated time slot.

For any kind of support, please contact the Customer Care

 

 

Read more

Send Rest API 1.28.0.34Release

From July, 11th  2023, a new version of Send is available.
The release is planned from 15:00 am to 15:30 am CEST.

The new versions include some minor bug fixes that enhance the application.

 

changelog Guide Resources Support

 

 

Read more

AccountCentral API 1.23.0.71 Release

From July, 11th  2023, a new version of Send is available.
The release is planned from 14:15 am to 14:45 am CEST.

The new versions include some minor bug fixes that enhance the application.

 

changelog Guide Resources Support

 

 

Read more

Send 7.25.0 Release

From July, 11th  2023, a new version of Send is available.
The release is planned from 09:00 am to 10:00 am CEST.

The new versions include some minor bug fixes that enhance the application.

 

changelog Guide Resources Support

 

 

Read more

AccountCentral API 1.22.0.69 Release

From July, 10th  2023, a new version of Send is available.
The release is planned from 10:30 am to 11:00 am CEST.

The new versions include some minor bug fixes that enhance the application.

 

changelog Guide Resources Support

 

 

Read more

Send SRR 2.6.1 Release

From July, 10th  2023, a new version of Send is available.
The release is planned from 12:00 am to 12:30 am CEST.

The new versions include some minor bug fixes that enhance the application.

 

changelog Guide Resources Support

 

 

Read more

Send OAuth 1.17.1.46 Release

From July, 10th  2023, a new version of Send is available.
The release is planned from 09:00 am to 09:30 am CEST.

The new versions include some minor bug fixes that enhance the application.

 

changelog Guide Resources Support

 

 

Read more