This is a list of CivicReady Email servers to be whitelisted on your firewall and email system (if applicable).
It is very important that you have your Email Administrator or other IT Professional in your organization whitelist the following list of email IP addresses:
Canadian Clients ONLY
- orange.ca.regroup.com 188.8.131.52
- orchid.ca.regroup.com 184.108.40.206
- pink.ca.regroup.com 220.127.116.11
- snow.ca.regroup.com 18.104.22.168
- silver.ca.regroup.com 22.214.171.124
- white.ca.regroup.com 126.96.36.199
- Without these IP address whitelisted, your postings could be delayed.
- In some cases, it is also required to open Port #25
- Also, we would request that you modify your SPF record as follows, as that is also causing issues. This will help us in passing through strict SPF checks.
xxxxxdomain-name.com text = "v=spf1 ip4:###.###.###.### ip4:###.###.###.### include:_spf.regroup.com -all"
If you send email messages to public domains i.e. yahoo, gmail, outlook, etc they allow all inbound traffic into their email domain. However, government institutions use their own email server, normally ending in .gov, etc. When multiple accounts in the same domain receive emails, their email security is being attached or spammed and it will normally block incoming emails. When they add the IPs for CivicReady into their server firewall, they allow reception of multiple messages from CivicReady.
IP Address whitelisting for clients with in-house email servers (MS Exchange servers, Postfix etc)
regroup.com <http://regroup.com/>: 188.8.131.52, 184.108.40.206 (PRODUCTION SERVER)
When you send messages, you have the option to use our original email domain server information in the header (From email) (@regroup.com) or use one of your own email addresses (@institution.gov). When you use your own email to send from CivicReady, the other email server firewall flags the email as phishing. Since there is no record that they sent that email, it adds to our SPF record. This masks all emails that come from @regroup.com as @institution.gov and allows them into the firewall.
SPF Records for clients who use their own email address as sender
DNS TXT record
rails/dev1.regroup.com <http://dev1.regroup.com/>: DNS Record Type: TXT, Hostname: example.edu <http://example.edu/>, Text: v=spf1 include:_spf.rails.regroup.com <http://spf.rails.regroup.com/> -all
ri.regroup.com <http://ri.regroup.com/>: DNS Record Type: TXT, Hostname: example.edu <http://example.edu/>, Text: v=spf1 include:_spf.ri.regroup.com <http://spf.ri.regroup.com/> -all
regroup.com <http://regroup.com/>: DNS Record Type: TXT, Hostname: example.edu <http://example.edu/>, Text: v=spf1 include:_spf.regroup.com <http://spf.regroup.com/> -all