2008/11/10 Sam Kuper
<sam.kuper@uclmail.net>
By using REJECT instead of DROP, you have no stealth. This means you can be port-scanned to look for weaknesses, e.g. unpatched OpenSSH vulnerabilities, etc.
That said, if SSH traffic is blocked, an OpenSSH vuln. might not be significant. If you're allowing and inbound traffic, though, any unpatched flaws in the app servicing that inbound traffic could expose your system to attack.
Also, by REJECTing rather than DROPping, you might be more vulnerable to DoS attacks.