It doesn't seem like it's worth it to run TAILS without being able to use a VPN to connect to TOR. Seems like you would be exposing yourself somewhat going this route. I was all hyped up to try TAILS today, and when I couldn't use a vpn, I didnt want to go on TOR. So besides the ability to load this and go, what else is there? Not having the VPN option is a killer.
Not being able to easily run a VPN client on Tails is a bummer.
One way to use a VPN with Tails is to purchase a dedicated VPN router and put the Tails machine behind it:
http://www.flashrouters.com/
Because of this problem:
https://tails.boum.org/blueprint/persistent_Tor_state/
Tails users should, at a minimum, pick a Tor relay to use as a bridge and then stick with that bridge whenever they use Tails. Since by default, Tails is amnesiac, it can't remember what guard it used the last time it booted and will therefore cycle through all of the guard relays, using a different one each time you boot. This cycling will eventually end up with you randomly picking a guard node and HSDir node (or exit node) run by the same bad guys (FBI / CERT). If that happens, they can link your access to the hidden service with your home IP address. If you pick a relay that you think you can trust from the public relay list and always enter that when booting Tails, it should prevent this problem. If you pick poorly, hopefully the VPN will save you.
Pick a relay from here to use as a bridge:
https://torstatus.blutmagie.de/
How to enter a bridge relay:
https://www.torproject.org/docs/bridges
The Tails bridge documentation:
https://tails.boum.org/doc/first_steps/startup_options/bridge_mode/index.en.html