openVPN Connection Issues

I only seem to be able to connect to EU VPN using openVPN, every other VPN I get the following loop occurring.

sudo openvpn lab_Tabboy-US.ovpn
2024-02-17 10:26:52 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2024-02-17 10:26:52 Note: --data-cipher-fallback with cipher 'AES-128-CBC' disables data channel offload.
2024-02-17 10:26:52 OpenVPN 2.6.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2024-02-17 10:26:52 library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10
2024-02-17 10:26:52 DCO version: N/A
2024-02-17 10:26:52 TCP/UDP: Preserving recently used remote address: [AF_INET]173.208.98.30:443
2024-02-17 10:26:52 Socket Buffers: R=[131072->131072] S=[16384->16384]
2024-02-17 10:26:52 Attempting to establish TCP connection with [AF_INET]173.208.98.30:443
2024-02-17 10:26:53 TCP connection established with [AF_INET]173.208.98.30:443
2024-02-17 10:26:53 TCPv4_CLIENT link local: (not bound)
2024-02-17 10:26:53 TCPv4_CLIENT link remote: [AF_INET]173.208.98.30:443
2024-02-17 10:26:53 TLS: Initial packet from [AF_INET]173.208.98.30:443, sid=a8bd605b 543693fa
2024-02-17 10:26:53 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2024-02-17 10:26:53 VERIFY KU OK
2024-02-17 10:26:53 Validating certificate extended key usage
2024-02-17 10:26:53 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-02-17 10:26:53 VERIFY EKU OK
2024-02-17 10:26:53 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2024-02-17 10:26:54 Connection reset, restarting [0]
2024-02-17 10:26:54 SIGUSR1[soft,connection-reset] received, process restarting
2024-02-17 10:26:54 Restart pause, 1 second(s)
2024-02-17 10:26:55 TCP/UDP: Preserving recently used remote address: [AF_INET]173.208.98.30:443
2024-02-17 10:26:55 Socket Buffers: R=[131072->131072] S=[16384->16384]
2024-02-17 10:26:55 Attempting to establish TCP connection with [AF_INET]173.208.98.30:443
2024-02-17 10:26:55 TCP connection established with [AF_INET]173.208.98.30:443
2024-02-17 10:26:55 TCPv4_CLIENT link local: (not bound)
2024-02-17 10:26:55 TCPv4_CLIENT link remote: [AF_INET]173.208.98.30:443
2024-02-17 10:26:55 TLS: Initial packet from [AF_INET]173.208.98.30:443, sid=5510826b 334d55d2
2024-02-17 10:26:56 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2024-02-17 10:26:56 VERIFY KU OK
2024-02-17 10:26:56 Validating certificate extended key usage
2024-02-17 10:26:56 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-02-17 10:26:56 VERIFY EKU OK
2024-02-17 10:26:56 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2024-02-17 10:26:56 Connection reset, restarting [0]
2024-02-17 10:26:56 SIGUSR1[soft,connection-reset] received, process restarting
2024-02-17 10:26:56 Restart pause, 1 second(s)
^C2024-02-17 10:26:57 SIGINT[hard,init_instance] received, process exiting
                                                                                                                                                                                                                                            
┌──(kali㉿kali)-[~/Downloads]
└─$ sudo openvpn lab_Tabboy-US.ovpn
2024-02-17 10:27:12 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2024-02-17 10:27:12 Note: --data-cipher-fallback with cipher 'AES-128-CBC' disables data channel offload.
2024-02-17 10:27:12 OpenVPN 2.6.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO]
2024-02-17 10:27:12 library versions: OpenSSL 3.1.4 24 Oct 2023, LZO 2.10
2024-02-17 10:27:12 DCO version: N/A
2024-02-17 10:27:12 TCP/UDP: Preserving recently used remote address: [AF_INET]173.208.98.30:443
2024-02-17 10:27:12 Socket Buffers: R=[131072->131072] S=[16384->16384]
2024-02-17 10:27:12 Attempting to establish TCP connection with [AF_INET]173.208.98.30:443
2024-02-17 10:27:12 TCP connection established with [AF_INET]173.208.98.30:443
2024-02-17 10:27:12 TCPv4_CLIENT link local: (not bound)
2024-02-17 10:27:12 TCPv4_CLIENT link remote: [AF_INET]173.208.98.30:443
2024-02-17 10:27:13 TLS: Initial packet from [AF_INET]173.208.98.30:443, sid=d9ef5457 2e496078
2024-02-17 10:27:13 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2024-02-17 10:27:13 VERIFY KU OK
2024-02-17 10:27:13 Validating certificate extended key usage
2024-02-17 10:27:13 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-02-17 10:27:13 VERIFY EKU OK
2024-02-17 10:27:13 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2024-02-17 10:27:14 Connection reset, restarting [0]
2024-02-17 10:27:14 SIGUSR1[soft,connection-reset] received, process restarting
2024-02-17 10:27:14 Restart pause, 1 second(s)
2024-02-17 10:27:15 TCP/UDP: Preserving recently used remote address: [AF_INET]173.208.98.30:443
2024-02-17 10:27:15 Socket Buffers: R=[131072->131072] S=[16384->16384]
2024-02-17 10:27:15 Attempting to establish TCP connection with [AF_INET]173.208.98.30:443
2024-02-17 10:27:15 TCP connection established with [AF_INET]173.208.98.30:443
2024-02-17 10:27:15 TCPv4_CLIENT link local: (not bound)
2024-02-17 10:27:15 TCPv4_CLIENT link remote: [AF_INET]173.208.98.30:443
2024-02-17 10:27:15 TLS: Initial packet from [AF_INET]173.208.98.30:443, sid=97d1f00e 8911db5a
2024-02-17 10:27:16 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2024-02-17 10:27:16 VERIFY KU OK
2024-02-17 10:27:16 Validating certificate extended key usage
2024-02-17 10:27:16 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-02-17 10:27:16 VERIFY EKU OK
2024-02-17 10:27:16 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2024-02-17 10:27:16 Connection reset, restarting [0]
2024-02-17 10:27:16 SIGUSR1[soft,connection-reset] received, process restarting
2024-02-17 10:27:16 Restart pause, 1 second(s)
2024-02-17 10:27:17 TCP/UDP: Preserving recently used remote address: [AF_INET]173.208.98.30:443
2024-02-17 10:27:17 Socket Buffers: R=[131072->131072] S=[16384->16384]
2024-02-17 10:27:17 Attempting to establish TCP connection with [AF_INET]173.208.98.30:443
2024-02-17 10:27:18 TCP connection established with [AF_INET]173.208.98.30:443
2024-02-17 10:27:18 TCPv4_CLIENT link local: (not bound)
2024-02-17 10:27:18 TCPv4_CLIENT link remote: [AF_INET]173.208.98.30:443
2024-02-17 10:27:18 TLS: Initial packet from [AF_INET]173.208.98.30:443, sid=b265de92 e38aa3dd
2024-02-17 10:27:18 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2024-02-17 10:27:18 VERIFY KU OK
2024-02-17 10:27:18 Validating certificate extended key usage
2024-02-17 10:27:18 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-02-17 10:27:18 VERIFY EKU OK
2024-02-17 10:27:18 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2024-02-17 10:27:19 Connection reset, restarting [0]
2024-02-17 10:27:19 SIGUSR1[soft,connection-reset] received, process restarting
2024-02-17 10:27:19 Restart pause, 1 second(s)

Can someone please explain the output to me?

Thanks!