How do you define track? Who are you worried about being tracked by?
Someone that is able to monitor from the exit point of your VPN would be able to know all the activities associated with that VPN.
Someone who is able to compromise the SSH server, the proxy or the OpenVPN end point may be able to work back to determine the true source of the traffic.
If you are just worried about basic traffic shaping from your ISP then you are almost certainly going way overboard. Running OpenVPN over SSH is going to give you some major performance issues and really won't really make a difference. Even a really basic VPN is usually enough to avoid blacklist-based traffic shaping.
If you are making connections to via this wacky-VPN to some service, someone at the other end could potentially track it back to your computer if they had the cooperation of the ISPs where the VPN and SSH hosts are hosted. Particularly if the VPN or SSH server is only being used by you. They would simply have to look at what is going into the system with the VPN, and what is going out. If it is only being used by one person you would see the un-encrypted traffic going out from the VPN, and the VPN traffic.
To summarize, if you are looking for 100% anonymity, I don't believe that your described setup would even come close to providing that, assuming that a governmental entity or someone really determined wanted to trace it back to your computer.
If you are just trying to avoid being blocked by some kind of filter at your ISP/School/work you are setting up something far to complex. If you can make outgoing SSH connections, then all they would know is that you have made an outgoing SSH connection. They wouldn't know anything about the SSH payload.