It may be a little late, but ...
The problem is that the default gateway changes to OpenVPN, and this interrupts your current SSH connection if you do not configure the appropriate routes before starting OpenVPN.
. iptables ip (iproute2). , OpenVPN "eth0". , , eth0, eth0 , eth0.
, . , .
# set "connection" mark of connection from eth0 when first packet of connection arrives
sudo iptables -t mangle -A PREROUTING -i eth0 -m conntrack --ctstate NEW -j CONNMARK --set-mark 1234
# set "firewall" mark for response packets in connection with our connection mark
sudo iptables -t mangle -A OUTPUT -m connmark --mark 1234 -j MARK --set-mark 4321
# our routing table with eth0 as gateway interface
sudo ip route add default dev eth0 table 3412
# route packets with our firewall mark using our routing table
sudo ip rule add fwmark 4321 table 3412
===
UPDATE:
Debian Jessie. Wheezy , "" :
# our routing table with eth0 as gateway interface
sudo ip route add default dev eth0 via 12.345.67.89 table 3412
"12.345.67.89" VPN-.