I didn’t previously pay attention to this and notice anything, but taking an explicit look indeed shows some noticeable ICMP Echo Request background traffic. Without in-depth analysis, just eyeballing iftop
output, this seems to typically be around 10-15 kbit/s, sometimes briefly exceeding 30 kbit/s.
The pattern seems interesting as well, e.g., same ID values from different sources (Linux ping by default sets this randomly, Windows ping seems to have a constant, version-specific value according to Wikipedia), or constant sequence numbers from individual sources (mostly 0, sometimes 1 or 3, other values seem rare). Sometimes alongside NTP requests, sometimes without simultaneous NTP traffic from a source (though again just observing for short time windows).
So seems not so much (human) users manually troubleshooting specific connectivity issues, but some sort of automated ping generation for unknown purposes (connectivity probes, heartbeats, keep-alives, destination probing, …).
At the same time, I am personally always happy when a destination responds to (manual) ping probes when I need to troubleshoot connectivity issues. And compared to the other traffic, mostly NTP at between 2Mbit/s and 12Mbit/s and above, the ping traffic doesn’t noticeably affect my exceeding my monthly uplink traffic quota (I have crossed having consumed half my quota last night, so one way or another, I will have to reduce my bandwidth setting before the month is out).
Also, responding to pings seems relatively light-weight for the machine compared to other tasks, foremost the NTP server daemon, but also stray HTTP connections/connection requests and other random (assumed) scanning activities.
So I decided to not introduce any restrictions on ICMP pings at this time - for now. YMMV.
Though I will monitor the situation, and still would be interested in background info from other people as to potential technical reasons why it might be a good idea to block incoming ICMP pings.