In order to allow SSH access from the OpenVPN interface (tun0) to the LAN interface (eth1) of the second VPS, you will need to configure iptables on the first VPS to forward traffic from the OpenVPN interface to the LAN interface. Here are the iptables commands you can use to accomplish this:
iptables -A FORWARD -i tun0 -o eth1 -d 10.108.0.3/20 -p tcp --dport 22 -j ACCEPT - This command will add a rule to the FORWARD chain that allows traffic from the OpenVPN interface (tun0) to the LAN interface (eth1) of the second VPS, if the destination IP is in the 10.108.0.3/20 range and the destination port is 22 (for SSH).
iptables -A FORWARD -i eth1 -o tun0 -s 10.108.0.3/20 -p tcp --sport 22 -j ACCEPT - This command will add a rule to the FORWARD chain that allows traffic from the LAN interface (eth1) of the second VPS to the OpenVPN interface (tun0), if the source IP is in the 10.108.0.3/20 range and the source port is 22 (for SSH).
iptables -A POSTROUTING -t nat -o eth1 -s 10.8.0.0/24 -j SNAT --to-source 10.108.0.2 - This command will add a rule to the POSTROUTING chain that will allow to change the source IP address of the packet to the IP address of the eth1 interface of the first VPS (10.108.0.2) before it leaves the eth1 interface so that it appears to come from the first VPS's IP.
iptables -A INPUT -i tun0 -p tcp --dport 22 -j ACCEPT - This command will add a rule to the INPUT chain that allows incoming SSH traffic on the tun0 interface,
iptables -A INPUT -i eth1 -p tcp --dport 22 -j ACCEPT - This command will add a rule to the INPUT chain that allows incoming SSH traffic on the eth1 interface,
iptables -A INPUT -i eth0 -p tcp --dport 22 -j ACCEPT - This command will add a rule to the INPUT chain that allows incoming SSH traffic on the eth0 interface,
iptables -A INPUT -i lo -j ACCEPT - This command will add a rule to the INPUT chain that allows incoming traffic on the loopback interface,
iptables -P INPUT DROP & iptables -P FORWARD DROP & iptables -P OUTPUT DROP - These commands will set the default policy for the INPUT, FORWARD and OUTPUT chains to DROP. This means that any traffic that does not match any of the previous rules will be dropped.
To make these rules persistent across reboots, you will need to use the iptables-save and iptables-restore commands.