IN my experience, such symptoms as reported originally by JB and since by other are most commonly the result of a re-routing of traffic within the ISP (a link failure and re-routing via another path) where the new path has a different MTU or frame size, and somewhere in the path the ICMP Type-3, Code-4 message returned to the requester is being dropped by a firewall where an overzealous FW admin has decided to block all ICMP messages.
In this case, using VPN reduces the MTU and the traffic gets through without need for fragmentation. Most ISP networks now support Jumbo Frames (>1500 bytes) but some services are limited to regular frames with a max size of 1500 bytes, which can be reduced by other encapsulations. So a frame of 1500 bytes might be ok normally, but if the ISP is re-routing via an alternate path or load balancing over dissimilar links, routers in the path may need to fragment the packets to pass over a link with a reduced MTU, but if the packet is flagged as "do not fragment" (via a bit in the TCP header field) the router will respond back to the source with an ICMP Type-3, Code-4 message noting the maximum frame size supported. If a firewall blocks that message from getting back to the source, it never knows why the packet was dropped and does not know to reduce the MTU for the flow.
One way to test is to temporarily reduce your client network interface MTU (down to say 1400 bytes) and see if it works. You can generally find instructions to set the MTU for your client's network interface via a quick Google search.